The Defuse Podcast: Where Experts Defuse Real Threats

Philip Grindell MSc CSyP

When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management. After Jo Cox MP was murdered, I was tasked with creating Parliament's specialist threat assessment team. I've spent 35 years stopping people who wanted to hurt prominent individuals, from MPs to royalty to the ultra-wealthy. What You'll Get From Listening You'll recognise the warning signs everyone else misses. That "helpful" new employee asking odd questions. The photographer at three different family events. The online critic whose interest feels too personal. You'll understand how dangerous people operate. The people planning to harm you treat you like a research project — cataloguing your habits, weaknesses, and blind spots whilst you're oblivious. You'll know what to do when a crisis hits. Not theory — actual steps. How to control the narrative when your reputation's under attack. When to stay silent and when silence destroys you. You'll discover what's already out there about you. Right now, strangers can map your life using tools you've never heard of. What You'll Hear Straight-talking conversations with ex-FBI agents who've tracked serial killers, digital investigators who can find anyone online, crisis managers who've saved billion-pound reputations, and psychologists who understand exactly how fixated individuals think. Topics include stalking, fixated individuals, insider threats, protective intelligence, reputation management, OSINT, digital vulnerability, and crisis leadership. These aren't interviews — they're operational briefings. Real cases, real tactics, real consequences. Who This Is For You must understand modern threats if you're responsible for protecting someone important (yourself, your family, or your boss). Physical violence is just one possibility. Reputation assassination, digital stalking, insider betrayal — these happen far more often and can be just as devastating. If you're prominent enough to be a target, you already are one. The question isn't whether someone's paying attention to you — it's whether you're paying attention to them. What Makes This Different No corporate nonsense. I've watched too many good people get hurt because they received sanitised advice from people who'd never faced real threats. You'll get the truth, even when it's uncomfortable. Experience that matters. I've identified planned terrorist attacks, managed stalking cases involving royalty, and helped ultra-wealthy families navigate threats they never considered. Every recommendation comes from cases where lives and reputations were on the line. Stories that stick. Theory doesn't save lives — understanding does. Every episode includes real cases that show you what threats look like before they turn dangerous. Because the people planning to hurt you aren't taking the day off. Subscribe now and learn how to manage threats before they become crises.

  1. NOV 11

    Policing, Politics and Prejudice – A Conversation with Neil Basu QPM

    Send us a text In this compelling and straight-talking episode, Philip sits down with Neil Basu QPM, one of the UK’s most respected and outspoken former senior police leaders. Neil shares the lessons, frustrations, and hard truths from over 30 years in policing — from the Stephen Lawrence inquiry to counter-terrorism, leadership under political pressure, and the moral challenges of modern policing. They discuss racism within the system, the dangers of disinformation, and the human cost of service. Neil also opens up about life after leaving the Met, his book Turmoil, and why courage and compassion are vital to real leadership. 🧭 Key Topics Covered Institutional Racism & Leadership Fear – Why acknowledging it is the only path to trust.Counter-Terrorism & Radicalisation – Lone actors, online grooming, and the threat from the far right.Politics & Policing – When public service collides with political convenience.The Human Cost of Service – How policing impacts families and communities.Leadership Lessons – Neil’s mantra: “Be quick, be competent, and be compassionate.”Life After the Met – From frontline leadership to mentoring, writing, and podcasting.📚 About Neil Basu QPM Neil Basu served as Assistant Commissioner for Specialist Operations at the Metropolitan Police, leading UK Counter-Terrorism Policing. Known for his integrity and willingness to challenge the status quo, he’s been at the heart of some of Britain’s most complex policing and national security operations. He is the author of Turmoil: The Official Autobiography – 30 Years of Policing, Politics and Prejudice — a raw and insightful account of his career and the challenges of reforming British policing. Neil also co-hosts the Crime Agents Podcast with crime journalist Andy Hughes, offering honest commentary and insight into crime, justice, and law enforcement today. Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    1h 13m
  2. OCT 7

    The Omnipresence of Fear: Understanding Stalker Psychology with Kerry Daynes

    Send us a text This episode features forensic psychologist Kerry Daynes discussing her 25-year career and expertise in stalking behaviour. Kerry transitioned from advertising plans to forensic psychology after university, despite being told it was "no job for a girl." She trained through the NHS rather than the typical prison service route. Key Professional Insights: Kerry advocates for "rational compassion" - maintaining realistic risk assessments whilst treating individuals with dignity. She argues against forcing people into neat psychological categories, emphasising that everyone requires individual understanding. Stalking vs Harassment: Stalking involves deeper fixation and obsession than harassment. Stalkers gather unnecessary information and seek proximity to victims. The UK recognises five stalker types: rejected (highest violence risk), intimacy-seeking, incompetent suitors, resentful, and predatory stalkers. Risk Assessment Problems: The widely-used DASH risk assessment tool lacks scientific validity despite being standard across UK police forces. This "quick and dirty" approach fails because it attempts to assess domestic abuse, stalking, and honour-based abuse with one inadequate tool. Personal Experience: Kerry shares her own stalking experience, describing the victim's sense of "omnipresence" - feeling unsafe everywhere. Victims typically shrink their lives and experience hypervigilance, which others often dismiss as paranoia. Societal Issues: Popular culture romanticises stalking through films like Beauty and the Beast and Twilight. Social media and data oversharing have made stalking easier while creating unrealistic expectations about pursuing romantic interests. https://www.linkedin.com/in/kerry-daynes-aa8b5740/ https://www.instagram.com/kerrydaynespsychologist/?hl=en Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    59 min
  3. JUL 15

    The Attack Cycle with James Hamilton Part 2

    Send us a text Send us a text In this compelling two-part episode, Philip Grindell welcomes back security expert James Hamilton to explore the "attack cycle" - a proven model used by criminals, terrorists, and assassins to target victims. Following the high-profile New York CEO assassination, Hamilton breaks down the eight critical phases: target selection, surveillance, final target selection, planning, rehearsal, execution, escape, and exploitation. The discussion reveals how attackers methodically progress through each stage and, crucially, how executive protection teams can identify and disrupt these phases. Hamilton shares practical insights on surveillance detection, threat assessment, and creating flexible security programs that balance protection with client accessibility. BIO James is a nationally recognized personal security expert and former FBI Supervisory Special Agent. For more than 33 years, he has been a protector, trainer, and advisor to the nation’s most at-risk individuals. He has real, practical, and unparalleled experience in executive protection, violence prevention, and personal security. This real experience was earned through service in local law enforcement, the FBI, and America’s premiere executive protection firm. He has protected government officials, high-net-worth individuals, and leading religious figures all over the globe and has empowered thousands of individuals to stay safe in an increasingly dangerous world. He has dedicated his life to this particular area of expertise and is sought after by those seeking practical and sound guidance. https://www.hamiltonsecuritygroup.com/ https://www.linkedin.com/in/james-hamilton-752894104/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    38 min
  4. JUL 1

    The Attack Cycle with James Hamilton Part 1

    Send us a text In this compelling two-part episode, Philip Grindell welcomes back security expert James Hamilton to explore the "attack cycle" - a proven model used by criminals, terrorists, and assassins to target victims. Following the high-profile New York CEO assassination, Hamilton breaks down the eight critical phases: target selection, surveillance, final target selection, planning, rehearsal, execution, escape, and exploitation. The discussion reveals how attackers methodically progress through each stage and, crucially, how executive protection teams can identify and disrupt these phases. Hamilton shares practical insights on surveillance detection, threat assessment, and creating flexible security programs that balance protection with client accessibility. BIO James is a nationally recognized personal security expert and former FBI Supervisory Special Agent. For more than 33 years, he has been a protector, trainer, and advisor to the nation’s most at-risk individuals. He has real, practical, and unparalleled experience in executive protection, violence prevention, and personal security. This real experience was earned through service in local law enforcement, the FBI, and America’s premiere executive protection firm. He has protected government officials, high-net-worth individuals, and leading religious figures all over the globe and has empowered thousands of individuals to stay safe in an increasingly dangerous world. He has dedicated his life to this particular area of expertise and is sought after by those seeking practical and sound guidance. https://www.hamiltonsecuritygroup.com/ https://www.linkedin.com/in/james-hamilton-752894104/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    29 min
  5. JUN 2

    When Crisis Hits: The Real Cost of Getting Reputation Wrong

    Send us a text When Crisis Hits: The Real Cost of Getting Reputation Wrong This week's Defuse Podcast featured Heather Blundell (CEO, Grayling UK) and James Clothier (Head of Crisis) discussing how reputation management has become essential protection. Key insights: Most crisis failures stem from human behaviour under pressure, not poor messaging. Female executives face different reputation attacks requiring specific strategies. Social media breaks stories before traditional media responds. Video responses are replacing written statements as authenticity matters more than polish. Heather revealed that proactive reputation management creates a competitive advantage, not just damage limitation. The conversation covers timing challenges, the importance of an external perspective, and why lawyers often make statements worse by stripping out emotion. They discuss how social media has transformed crisis response - young people get news from Snapchat, stories break on Twitter first, and video content is becoming essential. The practical advice focuses on being honest, letting the light in, and demonstrating genuine change rather than just promising to "learn lessons." Heather Blundell’s Biography:  Heather is the award-winning UK CEO of Grayling, a global PR firm,  responsible for 200 employees across nine offices.  She has spent more than 16 years as a trusted adviser to some of the world's largest companies and prominent CEOs, guiding them through periods of significant change, disruption, and complex reputation and crisis issues. Heather is also a regular media commentator in the national media.  James Clothier James is Head of Crisis at Grayling UK, responsible for leading the crisis and reputation practice, alongside the firm's corporate division.  Before joining Grayling, James spent two decades in senior editorial positions at The Sun and the Daily Mail. https://grayling.com/ #ThreatIntelligence #CrisisManagement #ReputationRisk #ExecutiveProtection #CorporateSecurity #StrategicCommunications Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    58 min
  6. MAY 13

    OSINT Part 2 - The Digital Lens Into Personal Security with Jon BlakeUntitled Episode

    Send us a text OSINT Part 2 - The Digital Lens Into Personal Security with Jon Blake In the second part, Philip and Jon delve deeper into technical aspects of OSINT and digital security: - VPNs (Virtual Private Networks): They discuss how VPNs create secure, encrypted connections through virtual "tunnels" and their benefits for security, particularly when using public Wi-Fi. They also address limitations, including potential impacts on speed and some websites detecting and blocking VPN access. - The security risks of public Wi-Fi networks, with Jon recommending always using a VPN when connecting to hotel, airport, or other public networks. - Using OSINT for due diligence, including understanding a person's "digital footprint" (information they know about and control) versus their "digital shadow" (information they may not be aware of, like data breaches). - Techniques for conducting effective searches, including using Google Advanced Search rather than basic searches, and applying filters strategically. - The challenges of images online, including metadata that can reveal sensitive information like location data, and the use of reverse image search technology. - The emerging role of AI and automation in OSINT investigations, with Jon cautioning that while AI tools can be helpful, they need human verification and should be used carefully. - Deep fakes and their security implications, particularly for high-profile individuals and organizations, with Jon emphasizing the need for verification processes and code words as potential safeguards. The podcast concludes with Jon highlighting his company's training programs and customizable "cyber investigator pathway" courses available through Cyber Ops Global. Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    39 min
  7. APR 28

    OSINT Part 1 - The Digital Lens Into Personal Security with Jon Blake

    Send us a text OSINT Part 1 - The Digital Lens Into Personal Security with Jon Blake In the first part of this podcast, Philip Grindell interviews Jon Blake, a former Metropolitan Police Detective who has become an expert in Open Source Intelligence (OSINT).  They discuss: - Jon's background as a career detective who moved into cyber investigations, worked in covert operations, and eventually became a national internet investigation coordinator before entering the private sector in 2015. What OSINT is: Open-source intelligence refers to gathering publicly available information and processing it for reliability and assessment. Jon notes that in policing, they've moved away from the term "OSINT" to "triple I" (internet investigation and intelligence). - The difference between the surface web (indexed by search engines), the deep web (content not indexed by search engines, such as commercial databases), and the dark web (accessible only through specific tools like Tor). - The distinction between open source (publicly available information) and closed source (information from private systems). - The importance of treating digital evidence properly, including creating audit trails, capturing evidence methodically, and preserving digital material to maintain its integrity. - How investigators must approach OSINT with the mindset that any information gathered could potentially become evidence, so proper documentation and verification are essential. The experts emphasise that OSINT is a powerful investigation tool but should be part of a comprehensive approach rather than relied upon exclusively. Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    37 min
  8. APR 14

    Countering Extremism with Guy Mathias - Part 2

    Send us a text "Countering Extremism with Guy Mathias" – The Defuse Podcast  This two-part podcast features an in-depth conversation between Philip Grindell and Guy Mathias, a renowned security expert with extensive experience countering extremism, particularly in the pharmaceutical and research sectors. Episode Summary In this fascinating discussion, Guy Mathias shares insights from his distinguished career addressing extremist threats, particularly from animal rights groups in the UK during the 1980s through the 2000s. The conversation explores the evolution of extremist tactics, sophisticated intelligence gathering methods, and how organizations can prepare for and counter modern extremist threats. Guy discusses how extremist groups evolved from direct action like arson attacks to more sophisticated operations involving infiltration, data mining, and targeted pressure campaigns. He emphasizes the importance of preparedness, risk assessment, and understanding both direct threats and supply chain vulnerabilities. Key Topics Discussed: Guy's background and entry into security without traditional military/police experienceThe evolution of animal rights extremism in the UK, particularly the SHAC (Stop Huntingdon Animal Cruelty) campaignSophisticated tactics used by extremist groups including: Direct action (arson, liberation of animals)Infiltration and insider threatsIntelligence gathering and targetingSupply chain disruptionHow extremist tactics have transferred to other causes and evolved with technologyThe importance of preparedness and risk assessmentChallenges of screening and vetting employeesProtecting organizational leadershipCurrent and future extremism trendsNotable Quotes: "The tactics were a local level. They were at a national level. They became an international level tactic." - Guy Mathias "I would certainly argue that there is a requirement for those of us working in the sector be that security risk or resilience, to be prepared. What does preparedness look like?" - Guy Mathias Practical Advice for Organizations: Develop and maintain a dynamic risk register that is regularly reviewedUnderstand your organization's supply chain vulnerabilitiesImplement thorough pre-employment screeningConsider ongoing screening for high-risk positionsEducate leadership about potential threatsConduct vulnerability assessments for executivesPrepare resilience plans for disruptionsThe podcast provides valuable historical context and practical security insights for organizations facing potential extremist threats in today's complex environment. Guy Mathias - https://www.linkedin.com/in/guy-mathias-19555673/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    51 min

Ratings & Reviews

5
out of 5
2 Ratings

About

When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management. After Jo Cox MP was murdered, I was tasked with creating Parliament's specialist threat assessment team. I've spent 35 years stopping people who wanted to hurt prominent individuals, from MPs to royalty to the ultra-wealthy. What You'll Get From Listening You'll recognise the warning signs everyone else misses. That "helpful" new employee asking odd questions. The photographer at three different family events. The online critic whose interest feels too personal. You'll understand how dangerous people operate. The people planning to harm you treat you like a research project — cataloguing your habits, weaknesses, and blind spots whilst you're oblivious. You'll know what to do when a crisis hits. Not theory — actual steps. How to control the narrative when your reputation's under attack. When to stay silent and when silence destroys you. You'll discover what's already out there about you. Right now, strangers can map your life using tools you've never heard of. What You'll Hear Straight-talking conversations with ex-FBI agents who've tracked serial killers, digital investigators who can find anyone online, crisis managers who've saved billion-pound reputations, and psychologists who understand exactly how fixated individuals think. Topics include stalking, fixated individuals, insider threats, protective intelligence, reputation management, OSINT, digital vulnerability, and crisis leadership. These aren't interviews — they're operational briefings. Real cases, real tactics, real consequences. Who This Is For You must understand modern threats if you're responsible for protecting someone important (yourself, your family, or your boss). Physical violence is just one possibility. Reputation assassination, digital stalking, insider betrayal — these happen far more often and can be just as devastating. If you're prominent enough to be a target, you already are one. The question isn't whether someone's paying attention to you — it's whether you're paying attention to them. What Makes This Different No corporate nonsense. I've watched too many good people get hurt because they received sanitised advice from people who'd never faced real threats. You'll get the truth, even when it's uncomfortable. Experience that matters. I've identified planned terrorist attacks, managed stalking cases involving royalty, and helped ultra-wealthy families navigate threats they never considered. Every recommendation comes from cases where lives and reputations were on the line. Stories that stick. Theory doesn't save lives — understanding does. Every episode includes real cases that show you what threats look like before they turn dangerous. Because the people planning to hurt you aren't taking the day off. Subscribe now and learn how to manage threats before they become crises.