LEADERSHIP
/Leadership fails when authority is informal and accountability is diffused. Titles exist, but decision ownership is unclear. In sensitive work, that becomes delay, inconsistency, and exposure.
Defined authorities. Clear ownership. Disciplined escalation.
Archer Knox operates through decision rights, not individual prominence. Clients receive named points of contact and engagement accountability. Public pages disclose roles, not identities, to reduce threat surface and protect client confidentiality.
Experience spans high-consequence work across North America, Europe, the Middle East, and parts of Africa and Asia-Pacific.
Decision Authorities
Roles disclose responsibility. Identity is contextual.
Executive Security Lead (FCSO)
Authority: sets risk posture, incident authority, and high-risk travel/event approvals.
Interfaces: C-suite, board, outside counsel.
Director, Protective Intelligence
Authority: triage criteria, escalation decisions, monitoring priorities.
Interfaces: EP/physical security, legal, communications.
Case Director, Litigation & Corporate
Authority: investigative scope, privilege routing, disclosure readiness.
Interfaces: trial teams, GC, outside counsel.
OSINT Fusion & Analytics Lead
Authority: collection plans, entity resolution, confidence scoring.
Interfaces: protective intelligence, platform engineering.
HUMINT & Source Handling Lead
Authority: source acceptance, contact strategy, deconfliction.
Interfaces: counsel liaison, case directors.
Red-Team & Adversarial Testing Lead
Authority: test design, success criteria, remediation sequencing.
Interfaces: FCSO, facility/IT owners.
Platform & Security Engineering Lead (Knox)
Authority: access policy, auditability, retention and redaction controls.
Interfaces: analytics, compliance, client IT.
Risk, Compliance & Counsel Liaison
Authority: policy alignment, legal holds, discovery posture.
Interfaces: GC, privacy, regulators.
Crisis Response Lead
Authority: activation, war-room cadence, cross-team coordination.
Interfaces: executive security, communications, external partners.
How We Run Sensitive Work
- Privilege-aware routing Counsel-first on matters likely to face discovery.
- Separation of duties Collection ≠ analysis ≠ approval.
- Dual-control Elevated access and sensitive source operations.
- Auditability Actions, edits, and decision points in Knox.
- Need-to-know partitioning Minimization and redaction by default.
Escalation & Decision Rights
| Trigger | Owner | SLO |
|---|---|---|
| Credible threat signal | Protective Intelligence Director | ≤ 60 min triage |
| High-risk travel/event change | FCSO | Same-day |
| Legal hold / disclosure question | Counsel Liaison | ≤ 24 h |
| Access exception / data request | Platform & SecEng Lead | ≤ 8 h |
| Public-facing incident comms | Crisis Lead + Counsel | War-room |
Diligence Available (Under NDA)
- Credential matrix by role (certifications, years-in-discipline, operating environments).
- Redacted case studies (problem → method → outcome; sourcing & confidence included).
- Client references (where permitted) and engagement accountability details.
- Security posture summary (data handling, retention, access controls, incident process).
- Insurance/licensing documentation as applicable to scope and jurisdiction.
Guardrails
- No covert activity without documented legal basis and client authorization.
- No pretexting for protected data; no scraping behind authentication without consent.
- All briefs include provenance, assumptions, and confidence—not just conclusions.