As a leader in threat emulation, experimentation and training, we help military and commercial organizations prepare for emerging worldwide threats. Our expertise encompasses the complexities of threat-activity and empowers our clients to effectively respond to an increasingly volatile world.


PROFESSIONAL. Our employees are committed to being pro-active in all matters that influence performance and elevate the quality of the products and services we deliver. We believe in a team approach where outcomes are measured by achieving the client’s requirements and the quality of our relationships.

HONEST. We know that meaningful relationships begin with trust. Trust is not purchased, but earned through honest and open dialogue supported by action. Our professionals are clear in communications, forthright in dealings, and committed to keeping promises.

INNOVATIVE. We consider creative and innovative leadership vital to success. We empower the inquisitive nature of our staff and strive to continuously improve everything we touch.

CAN-DO. Undeterred by obstacles, our can-do spirit will prevail. Providing focused leadership, we move forward meeting commitments and achieving our goals. We remain flexible and responsive to clients’ needs.

RESPONSIBLE. We are responsible to our clients – delivering high quality results that exceed expectations. We are responsible to our employees – providing safe learning environments, fair compensation, and quality of life. As leaders, we understand the importance of setting the bar high.

From the boardroom, to the battlefield, Threat Tec addresses targeted scenarios, ensuring relevant threat actions are replicated to a high degree of fidelity and meet our client’s objectives.


SOCIAL NETWORK ANALYSIS: How, What, and Who to Consider with Criminal Networks.

Over the course of the last 15 years many criminal organizations have taken the form of social networks.  These networks are decentralized, [...]

Read More

Training Against a Threat with Drones

Most Soldiers, Police, and security professionals have thought through how to use aerial drones, also called unmanned aerial vehicles (UAV's), to [...]

Read More

Cyber Security: Five Top Measures to Protect Your Companies Digital Assets


I’m often asked by family and friends what they should do to protect themselves from a cyber-attack, as well as what attacks they’re [...]

Read More