Threat Assessment and Intelligence in Southern California
Every security incident that reaches a crisis point passed through a window where it could have been prevented. The warning signs existed. The behavioral indicators were present. The threat was developing. What was missing was the intelligence capability to identify it and the methodology to act on it before it materialized.
Pentagon's threat assessment and intelligence services exist to close that window. We apply the same threat evaluation model used by the U.S. Secret Service to identify, analyze, and neutralize risks before they reach the executives, organizations, and families who retain us throughout Southern California. Prevention is not a philosophy we market. It is the operational outcome we deliver.
Founded in 2000 by former U.S. Army Recon Scout and LA County Sheriff's Deputy David S. Boone, Pentagon is comprised of agents and consultants from the Secret Service, FBI, SWAT, Special Operations, and Diplomatic Security Service. Every threat assessment we conduct draws on that collective federal experience.
Our Threat Assessment Methodology
Pentagon's threat assessment methodology is not a checklist or a compliance exercise. It is a structured intelligence process developed from decades of federal-level operational experience and refined through 25 years of protecting executives, organizations, and families in Southern California's complex security environment.
We approach every assessment as a behavioral problem before a physical one. Threats do not materialize randomly. They develop through identifiable stages driven by human factors: grievance, ideation, planning, and action. Our methodology focuses on identifying where a subject is in that progression and intervening before the final stage is reached.
Our past partnership with Dr. Paul Ekman, a pioneer in the study of behavior, emotion, and deception, shaped the behavioral science foundation embedded in every assessment we conduct. Our specialists are trained in micro-expression analysis and pattern recognition techniques that identify threat indicators conventional security approaches miss entirely.
What We Assess
Pentagon conducts threat assessments across the full range of exposure that executives, organizations, and high-net-worth individuals face in Southern California:
- Personal security exposure - Stalking risks, harassment patterns, unwanted public attention, and targeted threats arising from professional visibility or personal wealth
- Professional vulnerabilities - Workplace violence indicators, disgruntled employee risk, hostile termination threat profiles, and executive accessibility gaps
- Travel and movement risks - Route exposure, destination threat levels, transportation security gaps, and predictable pattern vulnerabilities
- Residential security - Estate access points, family exposure, neighborhood threat environment, and physical security posture of primary and secondary residences
- Digital and online threats - Social media threat monitoring, online harassment patterns, cyber-physical risk convergence, and open source intelligence gathering on identified threat actors
- Organizational threat environment - Workforce tension indicators, internal threat actors, vendor and contractor risk, and the behavioral landscape surrounding major corporate decisions
- Reputational and association risks - Public perception vulnerabilities, third-party association concerns, and brand security implications of executive decisions
Threat Assessment Process
Initial Consultation
Every assessment begins with a confidential consultation to understand the specific concerns, exposure points, and security objectives of the client. This conversation shapes the scope of the assessment and ensures the intelligence work that follows is focused on the threats that matter most to the specific situation.
Intelligence Gathering
Pentagon conducts comprehensive research covering background analysis, social media monitoring, open source intelligence, and protective intelligence specific to identified threat actors or risk categories. For organizational assessments, this phase includes review of internal communications, behavioral history, and personnel records relevant to identified risk individuals.
Behavioral Analysis
Pattern recognition and threat indicator identification using proven behavioral science principles. This is the phase where Pentagon's methodology diverges most sharply from conventional security assessments. We are not evaluating whether a threat looks serious. We are evaluating where in the threat development cycle a subject sits and what the behavioral trajectory suggests about the probability and timeline of action.
Vulnerability Evaluation
On-site reviews of residences, offices, travel patterns, and daily routines to identify the physical access points and predictable patterns that create exploitable exposure. Physical security assessments analyze site vulnerabilities, perimeter integrity, and the security measures already in place alongside the gaps that remain.
Threat Prioritization
Not every identified risk requires the same response. Pentagon produces a prioritized threat picture that ranks vulnerabilities by probability and potential impact, giving clients and their organizations a clear framework for where to focus protective resources first.
Mitigation Strategy
Customized security recommendations aligned with the client's operational requirements, lifestyle, and risk tolerance. For executives, this may mean adjustments to daily movement patterns, residential security hardening, and close protection coverage during elevated-risk periods. For organizations, this may mean personnel interventions, access control modifications, and coordinated response protocols. Recommendations connect directly to Pentagon's service capabilities, including executive protection, hostile termination security, and ongoing retainer coverage.
Implementation Support
Pentagon does not produce threat assessments and walk away. We support implementation of the recommended protective measures, coordinate protection teams, and remain engaged as the threat landscape evolves. For clients requiring ongoing intelligence monitoring, retainer programs maintain continuous situational awareness rather than a point-in-time snapshot.
Who Needs Threat Assessment Services
Threat assessment is the foundation of every effective protection program. It is not a service reserved for executives who have already received explicit threats. By the time a threat is explicit, the prevention window has narrowed significantly. Pentagon's clients engage threat assessment services proactively, before an incident occurs, because they understand that intelligence is what makes prevention possible.
- Corporate executives facing workplace threats, shareholder activism, or elevated public scrutiny following controversial decisions
- Organizations planning high-risk separations requiring pre-termination behavioral analysis of the individual being separated
- Ultra-high-net-worth families requiring comprehensive estate security evaluation and personal threat assessment
- Entertainment industry professionals managing fan attention, social media threats, and the security implications of high-visibility lifestyles
- Public figures and political officials navigating polarized environments and targeted harassment campaigns
- Organizations hosting high-profile events requiring advance threat assessment and security planning
- Any individual or organization whose professional position, personal wealth, or public visibility creates security exposure they have not formally evaluated
The Pentagon Difference in Threat Assessment
Federal Methodology, Not Corporate Template
The U.S. Secret Service threat assessment model was not developed for the corporate security market. It was developed to protect the most consequential targets in the world from the most motivated threat actors in the world. Pentagon applies that framework to the civilian protection environment because it produces a fundamentally more rigorous intelligence picture than anything the commercial security industry has developed independently.
Actionable Intelligence, Not Reports
A threat assessment that produces a report with no implementation pathway has limited value. Every Pentagon assessment concludes with specific, prioritized recommendations that connect directly to protective action. The intelligence we gather informs protection programs, not binders that sit on shelves.
Owner-Led Oversight
As a boutique firm, founder David S. Boone personally reviews every threat assessment Pentagon conducts. The strategic interpretation of the intelligence picture, the prioritization of risks, and the development of the mitigation strategy reflect 25 years of direct operational experience at the federal level. This is not delegated to junior analysts.
Schedule Your Threat Assessment Consultation
Pentagon provides complimentary one-hour security consultations for executives, organizations, and individuals evaluating their threat exposure. David S. Boone personally reviews every assessment to ensure the strategic guidance you receive reflects the full depth of our operational experience.
We serve clients throughout Los Angeles, Orange County, and San Diego. We are fully licensed and insured, maintain federal-level training standards, and deploy throughout Southern California with 24-hour rapid response capability.
Request Threat Assessment Consultation
