
Security Intelligence
Security Briefing for Family Members of Executives | CloseProtectionHire
Family members who are not the protected principal are often the weakest point in an executive's security. This guide covers spouse briefings, child protocols, domestic staff, and emergency procedures for households.
Written by James Whitfield, Senior Security Consultant
A close protection programme that covers the executive’s working day and travel but leaves their family without security awareness is a programme with a well-defined gap. Family members are predictable, accessible, and typically far less briefed on security than the principal they are connected to.
This does not mean every executive’s family requires close protection. What it means is that every executive’s security programme should include a proportionate family briefing: one that calibrates to the actual threat level, covers the specific vulnerabilities that family members represent, and gives each family member the protocols they need to function as informed participants rather than gaps in the system.
This guide covers the family security briefing in practice: what each family member needs to know, how to brief children without causing anxiety, domestic staff management, social media discipline, and the family emergency protocol.
The family as an intelligence target
Hostile actors targeting an executive have limited options. A properly briefed executive with a CP team, counter-surveillance awareness, and a variable routine is harder to approach directly than most people imagine. The family represents an easier access point.
The specific vulnerabilities:
Social media. A spouse who posts holiday photos geotagged at the family home, a teenager who names their school and posts photos in uniform, a child’s birthday party invitation circulated to a wide contact list with the home address – all of these create an intelligence picture that the executive’s own social media discipline cannot neutralise.
Predictability of family routines. School drop-offs, grocery runs, sports practices, the family’s regular weekend activities – these routines are far more predictable than the executive’s own schedule and may be observed without the executive’s knowledge or the CP team’s counter-surveillance detection.
Accessibility. A hostile actor who cannot approach the executive directly can approach a family member. A call to the residence claiming to be a school, a hospital, or an emergency service will typically receive a more open response from a family member than from the executive.
Leverage. In KFR environments, family members who are less protected than the principal are potential leverage. This is documented in Control Risks and Kroll case files – attackers have approached family members to obtain the principal’s schedule, or have threatened family members to create pressure on the principal.
The spouse or partner briefing
The briefing for a spouse or partner should be structured, honest, and calibrated to the actual threat level. Overstating the threat creates anxiety. Understating it leaves them uninformed. The components:
Threat summary in accessible language. The specific categories of risk relevant to the household – which might be as specific as kidnap risk in a particular country the executive travels to, or as general as the possibility that someone might approach the family to obtain schedule information. Not classified threat intelligence, but enough to understand why the protocols exist.
The verified caller protocol. Anyone calling the residence and asking for the executive’s schedule, travel dates, or home details should be treated with the same verification standard as described in the executive PA security briefing: do not provide information to unfamiliar callers, ask for a name and number and call back through a verified number. A plausible story from a stranger does not override this protocol.
Social media discipline. Which categories of information should not appear online: home address, home exterior photos, school names, regular family locations, the executive’s travel dates, and the family’s own holiday dates and locations.
The contact chain. Who to call and in what order if a security concern arises – the security manager, the CP team leader, the K&R insurer’s 24-hour line if relevant, and when to call police. The spouse should have these numbers stored on their phone independently, not only in the household shared contacts.
The code word system. A pre-agreed single word that, if any family member uses it in conversation, signals they are under duress and the listener should not follow instructions but contact the security team. The code word should be ordinary enough to insert naturally into a sentence but specific enough that its use is unambiguous.
Briefing children
Children can hold and act on security protocols if those protocols are age-appropriate and presented as normal family procedures rather than responses to imminent threat.
Under 10. Three simple rules: do not tell anyone you do not know where your parents work, only get in a car with someone on the pre-approved list, and tell a trusted adult immediately if someone approaches you who makes you feel uncomfortable. Practise these as games, not as threat briefings.
Ages 10-14. Add the code word system (a word they can say to a parent to signal they need help), a clear explanation of social media rules for the family (not posting home details, location, or school), and the emergency contact number they should call if they cannot reach a parent.
Ages 14 and over. A more complete briefing that includes the concept of social media operational security, what not to share about the family with new acquaintances, the pickup authorisation protocol (verified contacts list, code word for anyone not on the list), and the full emergency contact chain. Older teenagers are capable of understanding that their social media profile can create a security risk for the family without needing to understand the specific threat.
Domestic staff security management
Housekeepers, nannies, cleaners, gardeners, and personal assistants in the household have access to the residence, the family, and the daily routine. The following controls are proportionate for households at elevated threat levels:
Background vetting before employment. Identity verification, employment history, criminal record check, and references confirmed directly with previous employers. For the full vetting standard, see our security vetting and background checks guide.
Information discipline brief. A clear verbal briefing (and where appropriate, a written agreement) on what information is not to be shared outside the household: visitor identities, the executive’s schedule, travel dates, the household alarm code, and vehicle details.
Social media policy. No photography or filming inside the residence. No posts mentioning the household, the family, or the address. This policy should be explicit, discussed on employment, and reflected in the contract where applicable.
Access control. Domestic staff should not independently admit visitors to the residence during the executive’s absence. An agreed protocol for deliveries, maintenance visits, and unexpected callers protects against social engineering attacks on the household through a less-briefed household member.
The family emergency protocol
The family emergency protocol is a pre-agreed set of actions, contacts, and communication methods for use if a security incident occurs involving any family member. It is not a crisis management plan for a corporation – it is a practical set of instructions that a panicking family member can follow.
Components:
The contact chain in order – security manager, CP team leader, K&R insurer line if relevant. When to call 999 and what to say to police about who handles the incident.
Where to go if evacuation from the residence is required – a pre-agreed safe location (trusted family member, hotel, alternative property). The route to this location and the communication method to use in transit.
What to say if media contact occurs – the security team handles communications, family members do not comment.
The code word and what it triggers – if used by any family member, the listener does not follow instructions but contacts the security team.
The protocol should be rehearsed annually with all adult family members. A written version should be kept by each adult family member on their phone, not only in a home folder.
For the residential security controls that protect the physical environment the family occupies, see our residential security for executives guide. For the child-specific protection protocols relevant to higher-threat environments, see our protecting children of high-net-worth families guide. For the complete family protection security framework – school run security, EXIF metadata and digital footprint management, online safety for children of public figures, school safeguarding integration, domestic staff vetting for child supervision roles, and close protection deployment calibration by threat level – see our family and children protection security guide. For the vetting and management of domestic staff – including DBS check levels, employment history verification, NDA enforceability under PIDA 1998, information discipline briefing, device policy for floor staff, and departure protocols – see our domestic staff security vetting guide.
Sources
Control Risks: Family Security in the Context of Executive Protection, 2024. Kroll: Residential and Family Security Briefing Standards, 2024. CPNI: Protective Security Guidance for Families of Senior Officials, Centre for the Protection of National Infrastructure, 2023. OSAC: Personal Security Briefings – Family and Household Edition, 2024. ASIS International: Protection of Assets – Residential and Family Security Chapter, 2024. National Society for the Prevention of Cruelty to Children (NSPCC): Child Online Safety Guidance, 2024.
Key takeaways
The family security briefing is a component of the principal's security programme, not an add-on
A security programme that protects the principal at work and in transit but leaves their family unaware of security protocols has a significant gap. The household is a fixed, predictable location that is not under the CP team's direct observation most of the time. Family members who are aware of relevant protocols, understand the threat in accessible terms, and know who to contact in an emergency extend the security architecture rather than bypassing it.
Social media discipline in the family is the most commonly exploited gap
The executive who does not post their home address or travel dates on social media is undermined if their spouse posts a holiday photo geotagged at the family home, or their child's school Instagram account shows the school uniform and names the local area. Family social media discipline -- what not to post, what not to geotag, what privacy settings to apply -- is a practical, low-cost security measure that can close a significant intelligence gap.
Children can be briefed effectively without causing fear if the language is age-appropriate
Security awareness for children does not require sharing threat intelligence with a twelve-year-old. Simple, practised protocols -- the code word for authorised pickup, not sharing home details online, who to call if uncomfortable -- can be presented as normal family procedures. Children who know these protocols without understanding why are still meaningfully more protected than children with no briefing.
Domestic staff vetting and briefing is not optional for households with elevated threat profiles
An executive with a comprehensive travel security programme who employs an unvetted housekeeper and shares a detailed weekly schedule on the household noticeboard has an unmanaged information exposure. Background vetting, a clear information-handling brief, and social media discipline for domestic staff are proportionate controls for households at elevated threat levels.
The family emergency protocol works only if all members know it
A written emergency protocol in a folder no one has read is not a protocol -- it is a document. The protocol must be communicated to all adult family members, rehearsed at least annually, and updated when the household composition, the principal's threat level, or the contact chain changes. The code word system is particularly important -- a family member who has never heard the code word will not recognise it under stress.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
