The Scouting Report: How Crime Rings Track and Target Pro Athletes

They’re not just burglars.
They’re running plays.
Recent reports – including an in-depth expose from Vanity Fair - reveal what many of our clients already suspected: the threat isn’t just digital, and it isn’t random.
It's...
- Networked.
- Strategic.
- Organized.
No Longer One Guy With a Lockpick
A New York-based crime ring responsible for dozens of athlete home invasions used:
-
Rented luxury cars to blend into gated communities
-
Real-time coordination across multiple actors
-
Spotters, getaway drivers, and fences to move high-value items
And most importantly - DIGITAL INTEL harvested from social media, travel logs, and public records
It was scouted.
What They Exploit
Attackers don’t need passwords to compromise your world.
They only need your:
-
Flight schedule
-
Game calendar
-
Assistant’s post at the airport
-
Spouse’s tag at the event after-party
There are dozens if not hundreds of entry-points into your life.
Bad actors know these entry-points, and will sit back and watch for patterns.
And if your digital perimeter leaks, your physical one won’t hold for long.
That's why we start with hiding your digital perimeter first.
Your Crew is Part of Your Vulnerability
Because even if you're locked down, chances are - they aren't.
-
Friends and family
-
Stylists and service providers
-
Agents and advisors
-
Anyone who’s ever posted: “Headed to Vegas to support the boy!”
One post.
One tag.
One leak.
That’s all it takes.
Why It Matters
Modern attackers won’t just try to 'hack' you.
They'll recon your lifestyle.
In 2025 and beyond, the difference between being an easy mark - or becoming a HARD TARGET is: Practice.
Because 98% of attacks are digitally manipulated, you can't simply outsource this to a handler.
You have to personally possess the skills to thwart cybercrime.
That's why we make it a GAME.
Through immersive war-gaming events - you and your loved ones will build the skills to be discreet, cyber savvy and ultimately - to WIN.