888-831-0809

Digital Trails: Why Bodyguards Must Manage Their Own Devices

Digital Trails: Why Bodyguards Must Manage Their Own Devices

In an age where a bodyguard’s smartwatch can compromise a principal’s location, it’s time for protectors to evolve beyond physical readiness and tactical skill. Today’s threats don’t always come from a gun or a car tailing a convoy. They come from data—tiny bits of digital exhaust we leave behind in the form of calendar entries, fitness routes, contact syncing, and microphone access.

One recent example made international headlines: a Swedish bodyguard, through a fitness app synced to his smartwatch, inadvertently broadcasted the location of his principal. The lapse wasn’t malicious—it was a byproduct of convenience, automation, and unfamiliarity with how deeply integrated our lives have become with digital services.

As protectors, our job doesn’t end with watching the door or driving the route. We must now become gatekeepers of information—including our own. Because your phone, your watch, even your car may be silently broadcasting data that adversaries can weaponize:

  • Your smartwatch might be uploading run routes that start and end at a secure residence.
  • Your calendar app might be auto-syncing to a cloud server, exposing flight details or motorcade departures.
  • Your phone microphone could be activated by apps that don’t need it, listening for keywords or conversation metadata.

 

The modern bodyguard is not just a shield—he or she is a filter. A firewall. A gatekeeper of information who understands that protecting the principal includes minimizing personal digital exposure.

To help reinforce these principles, here’s a checklist I use before, during, and after a protection assignment. This list is evolving—but it will give you a strong foundation to operate securely and professionally in today’s environment.

 

Mobile Security: Best Practices for Minimizing Exposures

Digital Risk Reduction Checklist

  • Location & GPS Exposure
    • Be aware of location sharing on all apps, GPS history in apps and vehicle systems, and “Significant Locations” or “Frequent Locations” tracking
    • Pay particular attention to anything that shares your location elsewhere, such as fitness apps
  • Calendar, Travel & Scheduling
    • Avoid linking personal calendars to work systems
    • Remove specific meeting/travel details from shared invites
    • Use separate, secure scheduling apps for detail logistics and advances
  • Fitness & Wearables
    • Be extra cautious of GPS and sharing on wearables (e.g., Apple Watch, Garmin), especially social/friends features on fitness apps
  • Microphone, Audio & Camera
    • Check mic and camera permissions
    • Cover webcams and use microphone blocks when not in use
    • Use Faraday bags when necessary
  • Contacts & Comms
    • Use secure messaging apps like Signal or Wickr with auto-delete
    • Disable contact syncing across cloud and social apps
    • Note: Check location sharing on messaging apps
  • App Permissions & System Settings
    • Audit all apps for unnecessary permissions (contacts, mic, location)
    • Consider limiting certain apps to “While Using” permissions instead of “Always”
    • Keep OS and app software up to date for security patches
  • Social Media Discipline
    • Consider what, when and where you post – check location settings on social media apps
    • Monitor principal’s family/team accounts for posting risky details

Bottom Line:  Digital carelessness can be just as dangerous as a missed tail or an unlocked door. If you’re associated with someone important, your phone, watch, fitness tracker, etc. need to be locked down like any entry point into a secure facility.

Stay safe. – JML

———————————————————————-
Joseph M. LaSorsa, CPP® is currently employed as a senior partner managing and conducting: Protective Operations Training Courses, Executive Protection & Bodyguard Services, Risk Management Consultations & Seminars, Workplace Violence Prevention Seminars & Intervention Services, Security Consultations & Seminars, Private Investigations and Technical Surveillance Counter-Measures with LaSorsa & Associates – an International Protection, Investigations & Consulting Firm.
https://www.linkedin.com/in/josephmlasorsa

Leave a Reply