Important Protections for Honorable People
Many people who have relatively simple lives and reasonably low-profile professions tend to misunderstand the vulnerabilities that you face as a prominent individual or as a function of your good-faith profession. Some people have the naïve notion that living a properly lawful life, with no intentions of ever hurting anyone, would prevent delicately complicated situations that legitimately require secrecy.
The popular lack of empathy often scuttles any recognition that dishonorable adversaries relentlessly attempt to exploit your influence or assets. Being forsaken can be exasperated by heartless (but carefully avoidant of realistically enforceable illegality) adversaries who routinely leverage soft targets—manipulating, cajoling, and even coercing friends and family. (In this context, a soft target refers to an exploitable person or entity not trained or equipped for sophisticated adversaries.) A more-difficult-than-it-sounds lesson in countersurveillance training—especially when training civilians and NOC rookies who cannot reference a simple blanket of obvious professional duty—is to prevent entire categories of topics from exposure to loved ones, friends, and colleagues. Even when your rightful need for secrecy is explained with sage refinement, trusted members of inner circles often respond with feeling insulted or suspicious.
We can help to avoid those awkward situations, and to help to disable the manipulations of your adversaries.
Professionally Cognizant of Nuanced Sophistication
Not Diluting Focus onto Impromptu Pettiness by Opportunistic Consumers
Please click here for information about our necessarily limited size, and our professional focus. These elements combine to fortify our clients' privacy and serious safety.
Human psychology takes comfort in consistent routines, but the reality is that we are at the far extreme of numerous unfavorable risks for anyone of deliberate adversity. Except when carefully portraying NOC/undercover legends, we have watched throughout our respective careers how people of malicious intentions avoid us, and those who seek to be peacefully protected or aligned or tend to flock to us. Anyone of seriously adversarial or exploitative postures would saliently recognize people of our general sophistication and orientations to be at the extreme end of preventing passive exposure .
It's akin to how a typical meter maid could focus on proper tire direction, whereas a federal CPD officer could become concerned about someone with disjointed behaviors who is disjointedly deliberate and focused on precise compliance with a few specific mandates.
The Critically Weak Link of Hotels
Centuries of cultural traditions have permitted operational efficiencies and marketing affinities of hotels to be inherently public and porous in their operations. Minimal safeguards primarily are positive-cash-flow preventions of discouraging petty opportunism by consumers, along with discouraging unruly behaviors that can lead to costly aftermaths. The risks become glaring when contrasted with the tight home restrictions usually maintained by the predominantly educated, responsible guests of high-budget business travel.
Among many examples, hotel rooms are notorious for their streams of little-known, high-turnover workers who can be easily coerced, manipulated, bribed, and impersonated. These workers identify you by your recorded ID, overhear your conversations, look at your papers and computer screens, and have access to your possessions—with hardly any formidable barriers or severe accountability on access.
Technical Surveillance Counter-Measures
Client Privacy and TSCM beyond Relevant US Top-Secret MILSPEC
A primary business of ours, for which hospitality services are merely a marketing vehicle to introduce us to potential clients in our niche markets, pertains to executive-relevant countersurveillance. If the associated costs are worthwhile for you, we can provide military-specification—yet business-relevant—countersurveillance technology and methods for you, your computers, your phone calls, and your E-mail.
Services and technology are only for non-adversarial, honorable intentions that are legal in the US.
Location- and Network-Stripped • Seriously Encrypted
Limited usage of high-security calls and E-mail is free while you are receiving regularly priced, standard services from us, including international calls. If your equipment cannot accommodate the necessary configuration requirements, we will work with you for non-encrypted alternatives that provide at least basic anonymity. If possible, we recommend coordinating with us as far in advance as possible, ideally more than two weeks before your services. You are in control of protocols and encryption. Limitations and exclusions apply, particularly pertaining to discounted and promotional rates that are reserved online via consumer travel services. For the sake of efficiency, unless you request otherwise, the complexity of the technical surveillance counter-measures will be less than they would be if we were establishing a long-term system for you.
Security-Enhanced Phone Calls
With limitations on introductory free services while traveling, we provide for multi-layered, location-stripped, single-instance, salted encryption that would theoretically consume years of dedicated processing by the world's most powerful supercomputer to decode a single call, and then would need to be repeated with your next call.
Internet and E-Mail
For security and reliability, we can coordinate with you for offshore-encrypted Internet access, disabled from being directly traced electronically, at no charge.
For sensitive communications, we prevent your whereabouts from being traced via the Internet or for your Internet usage to be intercepted. If you are unsure whether you have clean equipment, we have optionally available systems that surpass relevant MILSPEC technology at the TS//SCI level, lawfully (in the US) beyond what is readily available commercially. That level of security surpasses what is readily available commercially, and is enabled via separate technologies including location-stripped, multinationally split, multilayered VPNs with salted single-instance encryption for your Internet. Your E-mail is further protected by additional layers of internationally parsed, singe-instance, salted encryption.
Multiple unrelated layers of premium-grade closed systems are used, surpassing relevant MILSPEC TS//SCI requirements. Hardware firewalls with multiple layers of UN-contracted antimalware is included at no charge with Business Catalysts, packages of the Executive Collection, and with regularly priced monthly and annual Signature hospitality.
These protections bypass exposures to a wide variety of vulnerabilities, as would otherwise be present with, for example, direct Tor connections.
Security of Ethernet or Convenience of Wi-Fi
Enhanced-security Ethernet is recommended and free with advance request for most packages, particularly with weekly and monthly services.
We can help to enable powerful security for your data and Internet activity during your stay with us.
Lower-security hospitality clients usually prefer Wi-Fi, although any Wi-Fi system—no matter how modern or sophisticated—is inherently porous, with a variety of uncertain vulnerabilities. Fortunately, regardless of the connection method, if an adversary does not know where you are, our connectivity is difficult to target—as long as you have not left breadcrumbs, provided information to soft targets (friendlies who can be manipulated), and have not otherwise been tracked (under our core business of countersurveillance via contracted legal services, we can provide professional assistance in these areas—please ask).
Most of our clients choose our services because we carefully maintain the confidentiality of their location, and, as such, targeted espionage by sophisticated adversaries is sufficiently suppressed to the point that the inconvenience:security ratio is not worthy of an Ethernet connection, in their minds. As professionals, we have never encountered a client who wants to use Wi-Fi who also had maintained sufficiently consistent protections to prevent tracking, and we advise all clients to opt for wired Ethernet, but we ultimately adhere to our clients' wishes.
Because the majority of business travelers prefer Wi-Fi, we provide Wi-Fi by default, but please let us know if you would prefer the greater security of a wired Ethernet connection. In general, with most rate plans for most package types at most whereabouts, we can provide wired Ethernet with at least two weeks' advance notice, usually at no additional charge. Reimbursement of our actual costs applies with Rabbit Hole Refuge and specially discounted Signature.
General Policies of Your Client Privacy
Conceptually, we endeavor to provide sophisticated countersurveillance and countersabotage beyond any other relevant commercial service. Please see other explanations on this page and links therein regarding other policies and protections.
These concepts would not apply to malice or illegality in the US or a reciprocating nation.
As much as possible, the concierge maintains your records remotely, under multiple layers of encryption for transmission and storage, parsed into packets on multiple servers in neutral offshore countries. Temporarily local working files are generally stored under multiple layers of encryption. After your stay with us, most of your data normally remains parsed among those servers under multiple layers of encryption and accessed under salted single-occurrence encryption.
Client records are accessible only by one personal designee at a time, except when your designated concierge is reasonably incapable of access, or when access by someone else is relevantly necessary for your immediate services, most client information is compartmentalized. Except when secrecy is breached by you or you effectively permit others' identification of you as a client, aliases and cryptonyms are generally used to identify you to other personnel. As functions of the short-term nature of most services, with most such services compartmentalized to a single handler, there are minimal client records. Most E-mail and voicemail messages are received, deleted, and wiped less than a day after being transmitted. Upon request to your concierge, we shall send you all information that we have saved about you, and we shall comply with any written requests to your concierge to correct, to restrict, and/or to delete any other information about you, as reasonably possible. Requests may also be sent via privacy@DignitaryDiscretion.com
Please click here to open a new tab with explanations of your compartmentalization protections, largely via the benefit of private service.
Many mechanisms of security for client data are applied. Local data are wiped after accessing. Sensitive files are generally parsed between Tel Aviv and Switzerland. Single-instance (OTR), end-to-end encryption, and subsequent wiping, is applied to packets, files, conduits, memory, and volumes, with each layer generally surpassing relevant aspects of US DOD MILSPEC for TS//SCI.
We will never sell your data.
No confidential client information has ever been provided to a governmental agency or other third party without a client's consent. No subpoena has ever been sustained to reveal confidential client information.
An aspect of our motivation of providing hospitality services so that we can demonstrate our value to potential clients pertains to seriously powerful countersurveillance. For additional fees, we can provide you with an extraordinarily secure, full-featured computer system, which would also provide you with the productivity of being connected to two large monitors and a full printer. If you are willing to abide by the inconvenient protocols and incur the reasonably affordable costs, we can uphold a broad spectrum of sophistication that generally surpasses many TS//SCI intelligence specifications.
Broad Protections Available to You
Under Your Control
A Few Examples
Especially Pertinent with the Executive Sovereignty Package
Countersurveillance • Countersabotage
VFR Countermeasures • Gait Asymmetry
Thermographic Perimeter Security
Personal Screening by You or Monitored by You
Please liaise in advance for conditions, limitations, and other details--but all services are custom, with dignitary-style versatility in consideration of your complexities and preferences, beyond commercially typical five-star abilities. A supportive concierge awaits hearing from you, 24 hours.
Additional Privacy Policies
Web Site • California Consumer Privacy Statement
No Cross-Marketing or Selling to Third Parties
Although we would hope that no actual client would ever wonder, we explicitly commit that your information shall never be sold to, or cross-marketed with, a third party.
Our proprietary Web site has zero cookies, and no information about you is collected. (As a reminder, be sure to clear cookies, super-cookies, and spyware from previous sites that indeed can track everything you visit.)
Please click here to learn about how we are protectively private and discreet, with extraordinary efforts of compartmentalization.
Our distribution services—including our online reservations—are administered by Sabre Corporation, which also administers the distribution of most of the world's largest hotel chains. Because any online reservation interface that is robustly sophisticated and reliable would realistically require scripts (at least based on current browser technology), we deliberately keep it completely separate from our informational site, with no overlapping of scripts or cookies. For mitigated exposure, you are welcome to place a reservation via a VPN.
When placing a reservation, you may identify your name by whatever self-reference you prefer. Please click here to learn about how we support your privacy with no ID required.
We have established with Sabre not to require a credit card for English-speaking reservations (our alternative to specifying the US and US-friendly countries—and therefore tracking your whereabouts or unjustly blocking dispersed/VPN hosting).
Please click here for your extraordinarily diverse payment options.
If you would prefer to pay for your fees via a credit card, please click here to learn about our sophisticated methods for supporting your compartmentalized privacy with card transactions.
Safer Formatting Tools
No Scripts • No Tracking via Fetched Images • No APIs
Within Our Informational Site
The use of the potent scripting languages is customary for easy and consistent quality of formatting, but we use no Java™ (which can contain many hidden compromises), user font data (which can be used for fingerprinting), or beacon/fetched graphics (which can secretly track users).
Using pure CCS and HTML, combined with our compartmentalized tight team (who is uncomfortable with high-profile publicity), we are prevented from many of the tools for a pretty or consistently refined Web site, as would be customary of a mass-market company. Because we do not use scripts to overcome browser insufficiencies, if you are using a high-security, bare-bones system, or if you are on the move and relegated to an archaic device from your go-bag, this Web site will be even uglier—but we deliberately structured it so that you will be able to access all information. There is no fetching of third-party graphics or user-tracked interactivity with third parties.
We pay premium fees for fonts to enable the complex layouts of this site. By paying for all fonts, there is no font-based fingerprinting of your system. As a furtherance of not allowing for search-engine analytics (the most prolific user-tracking on the Internet), there is no font-fetching to advertiser-based (and thus inherently compromising) providers of free fronts. However, Adobe™ has recently added one specific type of cookie, one instance for each of this site's two libraries of fonts. They explained that this change was for the purpose of validating licensed sites, thereby preventing others from hijacking our licenses. They assured us that this particular cookie is not for user-tracking, and our independent testing appears to validate that there is no surreptitious fingerprinting or ulterior motives, but feel free to block all cookies and/or external fonts. We have designed the site so that it will still display informatively without them. We will be changing font providers if we learn of any user tracking, despite further losses of formatting refinement.
Not for Ostentatiousness or Social Media
We discourage public forums of social media as severely porous for privacy, and our Web site does not provide for social-media interaction.
If you want a pretty Web site with cushy scripts, smart picture formats (which could be embedded with spyware), third-party map fetching, and cookies that remember you "for your convenience," you're probably better with a mainstream service anyway. If that describes you, you probably also would prefer all the user-traceable, high-exposure social networking and reviews associated with a customary hotel.
Please click here to learn about how we are not structured for mass-market consumers.
Some clients have asked why we are not on Tor. We are a private-sector business that needs to avail itself to its primary markets: prominent leaders, financiers, and other high-profile individuals. Even among our niche of small, office-based US PMCs, VPNs with the regular Internet are the mainstay. (Large PMCs already have their own resources, and usually only need us on an occasional basis.) Pertaining to a troublingly large percentage of other Tor users, we go to awkward lengths to discourage criminal and other bad-faith markets from ever being tempted to have anything to do with us. (Apart from our moral imperatives, a single bad situation with an unqualified client would not be sustainable.)
Adobe is a trademark of Adobe Systems Inc.
Java is a trademark of Oracle Corp.
We are not affiliated with, endorsed by, or licensed by Adobe Systems Inc or Oracle Corp.
Valuable Insights beyond Popularly Oversimplified Concepts
For relevant sermon notes from a now-retired field chaplain-deacon, please click here.
To learn more about our safehouse paradigm, please click here.
No Requirement for External Content
We do not use free Webfonts.
A contractor provided us with an insight of a perceptual concern: our emphasis on font styling perhaps indicates a philosophy of useless luxury versus specialized security. If one client took the time explicitly to broach such a rarely discussed concern, others probably have the same perception. The impetus is actually the opposite: an instinctive habit from the old days versus red SIGINT is to apply fonts with consistently focal thoughtfulness to communicate concepts.
For Web concerns, we enable redundancies and mitigate risks of third-party font fetching (regardless, a VPN is a matter of basic prudence to suppress these and a wide variety of other risks).
For years, we resisted the importing of free fonts, and we certainly would not fetch online abouts from Google™—regardless of the widespread culture of Web hosts. Such external fetching is usually tracked and can risk opening doors to compromised exposure, via legalistic manipulation or embedded wormholes.
Most travel agencies and other non-client users do not share your degree of diligence in austere security. Therefore, we pay premium licensing fees to the Canadian company Adobe™ to satisfy those ancillary users, while sustaining your ability to have script-free safety with no tracking. They recently initiated the use of two small counters (one per set of fonts), but they are counters of our usage to prevent third parties from spoofing us for our licenses; we have been assured in writing that they are not tracking our users or recording your information.
Nevertheless, feel free to maintain your block on external Web site content. We enable multiple redundancies to convey the same concepts via contingency fonts that almost any computer, pad, or smartphone would natively provide.
Google is a trademark of Google LLC.
Adobe is a trademark of Adobe Systems Inc.
We are not affiliated with, endorsed by, or licensed by Google LLC or Adobe Systems Inc.