HK Defense Solutions

EXECUTIVE PROTECTION

Your Threat Profile Changed.
Your Protection Model Didn’t.

In 2026, adversaries don’t just follow your car. They map your digital footprint, clone your voice with AI, fly drones over your property, and use your assistant’s LinkedIn post to confirm your travel schedule. The bodyguard standing next to you can’t see any of it.

HK Defense Solutions delivers executive protection built on intelligence, not just physical presence. Every detail begins with a comprehensive threat assessment. Every movement is informed by real-time analysis. Every variable is considered before it becomes a crisis. 

We operate across Palm Beach, Manhattan, Greenwich, Miami, Beverly Hills, and wherever our clients live, work, and move.

Built by Special Operations.
Trusted by Principals Who Cannot Afford a Failure.

Our founder served 12 years in U.S. Air Force special operations, including combat deployments, special mission unit selection, and multi-theater crisis response leadership. Our protective details are drawn from the same community — federal law enforcement, military special operations, and protective intelligence professionals who have operated in environments where failure costs lives, not just reputations.

Our clients include Fortune 500 CEOs, UHNW families managing multi-generational wealth, former heads of state, public figures under active threat, and founders whose personal safety directly impacts company valuation. You’ve seen them in headlines. You’ve never seen our logo next to them.

What We Actually Deliver

Every HKDS protective operation begins with intelligence, not scheduling. Before a single agent is deployed, we conduct a comprehensive threat and risk assessment that examines your digital exposure, physical environment, travel patterns, staff access, family profile, and the specific threat vectors relevant to your situation. The detail you receive is built around what we actually find — not a standardized package applied to everyone.

This matters because two principals with the same net worth and the same job title can face entirely different threat profiles. A tech founder in a public political fight requires a different posture than a hedge fund manager going through a high-net-worth divorce. A CEO facing activist pressure requires different advance work than a UHNW family dealing with a stalking incident. Intelligence shapes the detail. Not the other way around.

Before you arrive anywhere — a restaurant in Palm Beach, a board meeting in Manhattan, a charity gala in Greenwich, a private residence in Miami — our advance team has already been there. They’ve assessed the venue, the access points, the egress routes, the surrounding environment, and any intelligence specific to the location or timing. They’ve identified where you’ll enter, where you’ll exit, where the vehicle will stage, and what the contingency options look like if something goes wrong.

Advance work is the difference between a detail that reacts to problems and a detail that prevents them from developing. The firms that skip it are not doing executive protection. They are providing transportation with a security theme.

Our clients receive ongoing threat intelligence throughout the engagement. That means monitoring for credible threats across open-source and dark web channels, tracking sentiment and activist targeting patterns, watching for impersonation and social engineering attempts, and integrating all of it into the protective posture in real time.

When intelligence surfaces a credible concern, the detail adjusts. Routes change. Venues get re-assessed. Communications tighten. Your assistant may receive briefings she didn’t previously need. The protective posture flexes with the threat picture — not against a static plan written six months ago.

Our ground operations include armored vehicle coordination, protective drivers trained in evasive and defensive driving, and route intelligence that informs every movement. We operate armored fleets across Palm Beach County, Miami-Dade, Manhattan, and the Northeast Corridor. We coordinate with private aviation for secure tarmac-to-vehicle transitions at Palm Beach International, Teterboro, Van Nuys, and other major FBOs.

Transportation is the most predictable moment in most principals’ lives. If your routes repeat, your departure times repeat, and your vehicle is identifiable, you’ve created a pattern any competent surveillance team can map in two weeks. Pattern disruption is part of the operation, not an afterthought.

The executive protection detail you hire in 2026 should know your digital footprint cold. Ours does.

Before deployment, we run a comprehensive open-source intelligence audit on every principal: home address exposure across data brokers, social media footprint, family member visibility, staff digital hygiene, corporate-to-personal data bleed, and dark web credential monitoring. What we find informs the physical protection strategy. If your home address is publicly findable, the estate security adjusts. If your travel patterns are inferable from mobile ad data, the route planning changes. If your spouse’s Instagram is geotagging the family, we address it immediately.

Digital and physical are not separate problems. They are the same problem observed from two angles.

Every HKDS protective detail includes trained tactical medical support. Our medics are drawn from military and special operations medical communities, and they’re trained to respond to trauma, cardiac events, and protective medical scenarios in environments where emergency response may be delayed or unavailable.

For international travel and high-threat environments, we coordinate with medical evacuation providers and maintain pre-positioned medical contingency plans. For domestic operations, we maintain direct coordination with area hospitals and trauma centers. Medical capability is not an add-on. It’s a core component of real protection.

What Principals Are Actually Facing in 2026

The executive protection industry has been slow to acknowledge how dramatically the threat landscape has shifted. Most firms are still selling the same services they sold in 2015 — protective details, transportation, and advance work — without adapting to the vectors that actually drive incidents today.

Here’s what’s actually happening in the field right now.

AI voice cloning is operationally active.

In early 2025, researchers demonstrated that a 30-second voice sample was sufficient to generate convincing synthetic audio. By late 2025, the technology was commercially available. In 2026, we have documented cases across our client base of personal assistants, drivers, and family office staff receiving phone calls they believed were from principals — authorizing transfers, schedule changes, or access approvals — that were entirely artificial. The financial sector has reported billions in losses attributable to voice cloning attacks. The executive protection detail that doesn’t train its clients and their staff to verify through secondary channels is missing the most common social engineering vector of the year.

Drone incursions over UHNW properties are routine.

In Palm Beach County, private security teams protecting waterfront estates report multiple drone overflights per month. In the Hamptons, similar patterns. In Beverly Hills, weekly sightings during the summer season. Most of these drones are not hostile in the traditional sense — they’re conducting surveillance. Mapping the property. Identifying camera blind spots. Observing routines. The intelligence collected gets sold, stored, or used to plan something else later. Counter-drone detection and response is now a standard component of estate and principal protection in these markets.

Data broker records have weaponized address exposure.

A 2022 incident in which a judge’s son was murdered by a former attorney who had obtained the family’s home address through a data broker triggered multi-state legislation — including laws in New Jersey, California, and several other states — allowing public officials to have their addresses removed from commercial databases. Those laws don’t apply to private individuals. For UHNW principals, that means home addresses, family members’ names, property records, and estimated net worth remain freely accessible for anyone willing to pay $20 to $100 for a comprehensive profile.

Mobile Location Data Is a Buyable Intelligence Stream

Mobile advertising location data is now a documented intelligence collection tool. In 2023 and 2024, investigative journalism teams demonstrated that commercially available location data could be used to track specific individuals’ movements — including their visits to military bases, foreign embassies, and private residences. For our clients, the implication is simple: if you carry a phone and have standard apps installed, your patterns are buyable information.

Insider risk remains the dominant vector.

Across every protective engagement we assess — corporate, UHNW, family office — the highest-probability threat is someone with authorized access. The housekeeper whose phone auto-connects to the estate Wi-Fi. The driver whose social media documents the daily routine. The contractor who photographs the camera layout. The former personal assistant whose personal email still receives forwarded copies of the principal’s calendar. These aren’t hypotheticals. They’re what we find, consistently, on almost every property we assess.

The executive protection firms adapting to this environment are building intelligence-led operations that integrate digital exposure, insider risk, and physical protection into a single framework. The firms that aren’t are still protecting against the 2015 threat picture — and their clients are paying premium rates for a service that was accurate a decade ago.

Why HKDS Exists

John Hamilton didn’t plan to build an executive protection firm. He planned to serve his country, and he did — for 12 years in U.S. Air Force special operations, across multiple deployments and mission sets that most people will never hear about and that he will never be able to fully discuss.

In Iraq, with a four-man team, he built the combat search and rescue infrastructure for special operations forces across the theater. Not in theory. In execution, under pressure, where failure meant lives lost. 

Later, he earned a seat in a special mission unit where the standard for performance was absolute. 

He stood up forward operating bases, designed security postures for Marine and Army divisions, and built layered defense systems in environments where the threat was constant and real. He served as a security team leader for crash sites and sensitive locations. He ran crisis reaction planning for scenarios ranging from downed aircraft to hostage situations.
 
Every one of those missions was built on intelligence. You didn’t move a team without knowing what you were walking into. You didn’t launch a convoy without a threat picture. You didn’t touch a target without knowing who else was on the ground.

When he transitioned out and entered the civilian executive protection world, he found an industry that had completely disconnected from that standard. Teams looked sharp but operated blind. Reactive instead of preventive. Optics instead of outcomes. He called it theater — and he built HK Defense Solutions to end it.

That’s the standard behind every protective detail we deploy. Every assessment we conduct. Every principal we accept.

Executive Protection Coverage Across the East Coast and Beyond

We deploy protective details and conduct operations across the markets where our clients live and work:

Palm Beach County
Miami-Dade and Broward County
New York City
Greenwich & Fairfield County
The Hamptons & North Fork
Los Angeles
Aspen, Jackson Hole & Nantucket
International coverage

What Working With HKDS Actually Looks Like

You stop wondering if your protection team would notice a surveillance pattern. You stop hoping that nothing happens while your current firm learns on your time. You stop paying premium prices for a service that should be included by default.

You receive intelligence reports you can actually act on. Your assistant learns how to verify communications before they trigger wire transfers or schedule changes. Your family members — especially the ones whose digital habits create the most exposure — get briefed without being alarmed. Your home address comes off commercial databases. Your routes stop being predictable. Your staff understands what they can and cannot post. Your detail talks to your estate team. Your estate team talks to your travel team. Your travel team talks to your digital monitoring team. All of it operates as one system.

And if something ever does develop — an escalating threat, an active incident, a crisis that requires rapid response — the team protecting you has already planned for it. The playbook isn’t being written in the moment. It was written weeks ago, and it updates continuously. 

That’s what protection is supposed to feel like.

Two Ways to Start

Download the Converged Digital Exposure Checklist

The first step in modern executive protection is understanding what an adversary can already learn about you. This 15-point checklist walks you through the exact audit we run on every new principal — social media, data brokers, dark web exposure, family footprint, staff digital hygiene, and the intersection points between digital and physical risk. Free. Confidential. Instant download.

Request an Executive Threat Profile Assessment

A confidential one-on-one session with our principal to assess your current protection posture. We review your digital exposure, movement patterns, staff access, and existing detail configuration — and identify specific gaps between what you think is covered and what actually is. 45-60 minutes. Mutual NDA. Conducted in person or via secure video.

“If your protection team can’t tell you what your digital footprint reveals to an adversary right now, they’re guarding a perimeter that doesn’t exist anymore.”

— JOHN HAMILTON, HKDS Founder
Before you leave, ensure you’re protected for the new threats of 2026.

Download the Converged Digital Exposure Checklist

Cover of HK Defense Solutions Board-Level Risk and Continuity Oversight Checklist

The 15-point audit that reveals what an adversary can buy about you for under $100,  the same checklist we run on every new principal.