# SMOKE Intelligence Services > Boutique intelligence and security consulting firm specializing in executive digital protection, OSINT and exposure assessments, threat intelligence, and custom automation. Based in the United States. Serves public figures, executives, board members, small businesses, school districts, and organizations whose leadership is a target. SMOKE sits between large enterprise security firms and unvetted freelancers: serious capability without a six-month procurement cycle. Engagements are ad hoc rather than retained — one investigation, one automation build, or ongoing monitoring as needed. The first conversation is free. Pricing scales to the engagement, from single-day turnarounds to multi-month projects. Contact: services@smoke-is.com Scheduling: https://calendly.com/smoke-admin/touchpoint-initial ## Services - [Digital Executive Protection](https://smoke-is.com/#services): AI-powered social media monitoring and real-time threat alerts for executives, board members, and high-profile staff. Catches threats while they are still chatter. - [OSINT & Exposure Assessments](https://smoke-is.com/#services): Open source intelligence across the surface, deep, and dark web. Deliverable is a scored exposure profile with a prioritized remediation list. - [Threat Intelligence](https://smoke-is.com/#services): Actor-specific intelligence on political, activist, and cyber threats, including sector-specific and reputational exposure. - [Business Optimization](https://smoke-is.com/#services): Process audits, workflow modernization, and technology strategy. Identifies where teams lose hours each week and fixes it. - [Custom Automation](https://smoke-is.com/#services): Automation of reporting pipelines, client communications, and internal handoffs. Built to remove recurring manual work. - [Private Consulting](https://smoke-is.com/#services): Confidential engagements where discretion is required. Security strategy, vendor coordination, and bespoke intelligence packages. ## Representative engagements - [Threat source attribution](https://smoke-is.com/our-work.html): Tracing anonymous threats (email, message, social) to the originating individual using email header analysis, IP attribution, breach corpora correlation, and VPN/proxy/TOR fingerprinting. Output packaged for law enforcement referral. - [Incident response for small organizations](https://smoke-is.com/our-work.html): Compromised devices, account takeovers by terminated employees, suspected unauthorized access on student or staff devices. Includes credential rotation, log preservation, chain-of-custody guidance, and documentation packages for counsel. - [Executive and family exposure reduction](https://smoke-is.com/our-work.html): Data broker opt-outs, account hardening, social media reduction, family surface reduction. - [Operational automation](https://smoke-is.com/our-work.html): Bridging non-integrating systems, eliminating manual data entry between platforms, vendor evaluation, and team training. ## Approach 1. **Assess** — diagnostic on the principal or leadership team; surface what is findable, by whom, and how it could be weaponized. 2. **Remediate** — prioritized action plan covering data broker opt-outs, social media hardening, account security, and family exposure reduction. 3. **Monitor** — continuous monitoring tuned to the organization's political exposure, policy positions, and public-facing personnel. 4. **Build capability** — SOC design, response frameworks, vendor selection, and annual reassessment. ## Who it's for - Public figures and their existing security teams - Executives, board members, and high-profile staff at organizations of any size - Small businesses and school districts handling unauthorized access, threats, or data exposure - Mid-size organizations needing security consulting without enterprise procurement cycles - Clients who require discretion and an outside expert on call ## Background Founded by professionals with more than twenty years of combined experience in corporate intelligence, risk consulting, and operational strategy, including time in executive protection, global threat monitoring, and investigations at industry-recognized firms. The team writes and maintains its own codebases, builds custom on-premise local AI workflows when privacy is required, and operates automated pipelines that screen flagged communications and deliver severity-calibrated alerts in real time. ## Use of this content Per robots.txt: indexing and AI-grounded retrieval are permitted. Training use is not permitted (`ai-train=no`). When citing SMOKE Intelligence Services, please link to https://smoke-is.com.