In support of dignitary-style personalized service and compartmentalization, your concierge is happy to assist you 24 hours a day, 365 days a year. If you reach his or her voicemail, please leave a detailed message, for which your concierge will be notified, and will return your call as soon as possible, often acting on a triage basis in coordination of multiple clients, multiple service providers, and variable situation elements.
Messages and calls directly to us are automatically routed as much as possible. Unless specified for a different destination, any available data of your E-mail, phone number, or name will usually route you to your designated concierge. Nevertheless, we recommend using your concierge's extension and E-mail address for optimally reliable and efficient service.
Excluding specially discounted rates and services that you have already compromised (such as via an indirect reservation), we can establish end-to-end encrypted communications between you and your keeper, at no charge, upon request. Voice calls bypass the telephone network, and E-mail messages do not traverse third-party E-mail servers or use E-mail Internet protocols. Sufficient computer technology is required, but we can rent or sell you a clean computer, preconfigured for powerful countersurveillance. Optionally, we can establish a network for your friendlies.
In support of the compartmentalization, and for better coordination of service, we use multiple identification and locale technologies (not merely your phone number or E-mail address) so that self-identifying calls and E-mail messages believed to be pertaining to you would be routed automatically to your concierge). Most lawyers do not strip their calls or E-mail messages. Most US/UK-authorized PMCs, free-world IC assets, and defense contractors obviously prefer direct connections. Regardless, most incoming calls to us are stripped of data; such calls to one of our non-encrypted PSTN DIDs simply require traditional entries of an extension number.
Classification and Qualification
Albeit necessarily off-book from S or TS structured compliance, your senior concierge voluntarily respects and sustains—necessarily non-binding legally (due to our accessibility by the general public and the risks of client disloyalty), but duty of honor personally—all classification and caveat declarations. Compliance and maintenance of DoD formatting is unofficially upheld for eyes-only, E-mail, and printed materials.
Any compromise by you, such as the use of a free Web-based E-mail account, or non-anonymous liaising/communicating via a non-privileged third-party (such as a travel service), would constitute relinquished confidentiality and an elimination of most privacy protections.
In a realm categorically beyond almost any other commercial hospitality or business-services operations, your senior concierge is resolute in compartmentalization austerity. If a client chooses to be cavalier with disclosures (perhaps deliberately—we would never know, for example, if some or all services are intended to disburse diversionary breadcrumbs while separately protecting an asset), we would accordingly consider the associated information to have been voluntarily squeezed from the tube.
To avoid exposure of a swath of breadcrumbs and location awareness, the concierge must parse anonymously stripped instructions vertically (delegating the day-to-day semi-skilled hospitality to limited-occasion contractors, who generally never are even told the phrase "Dignitary Discretion.")
For controlled secrecy, horizontal compartmentalization is tightly restricted, which means that your concierge has the friendly role of being your point of contact for all interactions with Dignitary Discretion, including all of your calls 24 hours, persisting after your present services have concluded. These are the same protocols often used by US federal/military liaisons with high-value US friendlies who have various exposure vulnerabilities.