The ransom note arrived 22 minutes after she disappeared. Her husband was three floors up. Without SGAW, that note was all he had.
Click anywhere to continue
● Sentinel Guard Active
Case Study · Executive & High-Value Target Security
The note arrived in 22 minutes.
She was taken from a charity gala in Prague. Her husband was upstairs at the same event. The window between her disappearance and the ransom demand was 22 minutes. With Sentinel Guard, her coordinates were live in 4 seconds.
22Minutes to ransom demand
4Seconds to live signal
90Seconds from contact to exit
Chapter 1
She wasn't the target. She was leverage.
Claire Mercer
Composite character · For illustrative purposes
Age34
LocationPrague, Czech Republic
ContextAcademic residency, Charles University — three-week program
HusbandDavid Mercer — Series C fintech CEO, San Francisco
EventCharity gala, Prague Municipal House — attended without security detail
DeviceSentinel Guard — concealed lapel pin, standard evening wear
David Mercer's security team covered David. They managed his travel, his schedule, his exposure. They had protocols for every scenario involving him. What they did not have was a protocol for the night his wife attended a charity gala three floors above him — unescorted, unknown to the threat network as a target, carrying nothing but a Sentinel Guard device they had insisted on two months earlier when he first started receiving credible threats.
The kidnappers had been watching David for six weeks. They knew the gala. They knew the guest list. They also knew that the CEO's wife would be there — and that she would be easier to take than he was.
Chapter 2
9:47 PM. Municipal House. Prague.
The gala was three hours in. David was on the fourth floor in a private reception with donors. Claire was on the mezzanine level with other guests — visible, relaxed, in public. Two men approached her near the terrace entrance. They wore event staff lanyards. One spoke to her briefly. The other positioned himself between her and the nearest security camera.
From first contact to the service corridor: 34 seconds. From the service corridor to the loading dock: 47 seconds. From the loading dock to the vehicle: 9 seconds. Total: 90 seconds. No one saw it happen.
"She was in a room full of people. The camera footage shows her walking toward the terrace. Then she's gone. No struggle. Nothing."
In the vehicle, her hands were zip-tied. Her phone was removed and placed in a signal-blocking bag. They had prepared for every device she might have. They had not prepared for a device with no signal at rest — a device that emits nothing until deliberately activated.
During the transition from the terrace to the corridor — in the 4 seconds between first contact and the moment she understood what was happening — Claire activated Sentinel Guard. A deliberate press. Two seconds. The lapel pin that had been sitting inert on her jacket since 7:00 PM sent a single transmission. No phone required. No cellular network required. Exact coordinates. Timestamp. Identity confirmed.
9:47 PM
First contact — terrace level, Municipal House
Two individuals approach Claire Mercer. Event staff lanyards. Positioning between her and nearest camera.
Signal transmitted. Exact coordinates: 50.0875°N, 14.4213°E. No cellular required. Adam's Watch receives.
9:48 PM
Loading dock — vehicle contact
Claire placed in vehicle. Phone removed. Signal-blocking bag deployed. Sentinel Guard already transmitted — 56 seconds earlier.
9:51 PM
David Mercer's phone — alert received
Adam's Watch notification. Claire's location. Signal active. Recovery coordination begins from San Francisco and Prague simultaneously.
10:09 PM
Ransom demand received — encrypted message
22 minutes after acquisition. By this point, recovery assets were already in motion. Claire's coordinates had been live for 22 minutes.
Chapter 3
The note arrived. Everything else was already moving.
Standard kidnap-for-ransom protocol assumes the family learns about the abduction when contact is made — the demand, the proof of life, the first call. From that moment, negotiation begins. Every hour the window narrows. The longer the victim remains in the system, the harder the recovery.
The ransom demand arrived 22 minutes after Claire was taken. In a standard scenario, that 22-minute gap is dead time — the family is unaware, no assets are moving, the kidnappers have a full head start.
⊖ Without Sentinel Guard
A note. No coordinates. Negotiation begins blind.
10:09 PM. The demand arrives. David's security team scrambles. They have a message, a number, and no idea where she is.
The 22 minutes before the note are gone. The kidnappers have moved her twice. The vehicle is off city cameras. Standard negotiation protocol begins — which means days, not hours.
The window for immediate recovery has closed. What follows is a process designed to extract maximum leverage before any resolution.
✓ With Sentinel Guard
4 seconds after contact. Live signal. Recovery already in motion.
9:47:04 PM. The signal fires. David's phone receives the alert before he knows anything is wrong. His security team has coordinates before the kidnappers reach the loading dock.
Recovery assets are in motion 22 minutes before the ransom note arrives. When the demand comes in, it is already irrelevant — the team knows where she is.
The 22-minute gap the kidnappers planned to own became a 22-minute head start for the people trying to bring her home.
Adam's Watch · Live Dashboard Simulation
What David saw from San Francisco at 9:51 PM.
● Adam's Watch · Active Signal
SG-EXC-0892 · MERCER, CLAIRE
Live Coordinates
50.0875, 14.4213
Status
● ACTIVE — Touch-activated distress
Signal Type
Lapel pin · 2-sec press · No cell required
Activated
9:47:04 PM · Prague, CZ
Signal Age
—
Operation
MERCER HOUSEHOLD Executive protection · Family orbit
Notified:
● David Mercer — San Francisco
● Security Lead — Prague
● Response Coordinator
● Crisis Counsel
🔠 Dispatch Log — Adam's Watch · Mercer Household
The threat is no longer just the executive.
Surveillance operations map everyone in the orbit — spouse, children, close associates. The executive is protected. The orbit is exposed. Sentinel Guard closes that gap.
Why Sentinel Guard
The phone is the first thing they take.
Every kidnap-for-ransom operation has the same first move: remove the victim's means of communication. The phone goes into a signal-blocking bag within seconds of acquisition. Any app, any tracker, any emergency function tied to the phone is neutralized before the vehicle leaves the scene.
Sentinel Guard operates independently of the phone entirely. No cellular network. No WiFi. No Bluetooth pairing. The device carries its own independent transmission capability. Removing the phone removes nothing.
Capability
Standard Personal Security
With Sentinel Guard
Signal after phone removal
⊖ Eliminated — phone is the signal
✓ Unaffected — independent of phone
Activation without visible motion
⊖ All methods require visible action
✓ Lapel press — undetectable movement
Signal at rest
⊖ GPS trackers emit continuously — detectable
✓ Zero emission at rest — nothing to sweep
Coordinates before demand
⊖ Location unknown until contact made
✓ Live signal from moment of activation
Orbit coverage
⊖ Principal-only in most deployments
✓ Deployable across full family orbit
"The window that matters in a kidnap scenario is not the negotiation. It is the 20 minutes before anyone knows she is gone. That is the window Sentinel Guard owns."
The System
Sentinel Guard & Adam's Watch
🛡
Sentinel Guard
Active Deployment · Covert Wearable
A concealed, wearable device that emits no signal at rest. Activated by deliberate touch — no phone, no visible action, no cellular required. Deployable as a lapel pin, a watch component, or embedded in standard personal items. Known only to the wearer and the monitoring command structure.
👁
Adam's Watch
Monitoring Platform · Real-Time Coordination
The command interface. When a Sentinel Guard device activates, Adam's Watch receives the signal, surfaces the coordinates, and notifies designated contacts simultaneously — the principal, the security team, the crisis coordinator. Live position. Full context. On any device, anywhere in the world.
The Threat Landscape
The pattern is accelerating.
87%
Of global kidnap-for-ransom cases occur in Latin America & West Africa
85/mo
Criminal kidnappings in Mexico alone in 2024
Rising
Returning to pre-COVID levels and climbing — European targets increasing
Orbit
Family members and close associates are increasingly targeted over principals — lower protection, same leverage
Sources: Control Risks Global Kidnap Review 2024 · OSAC Crime & Safety Reports · Kroll Global Fraud & Risk Report
Request a Briefing
The orbit is the exposure.
Sentinel Guard and Adam's Watch are ready for immediate deployment across executive protection programs, family orbit coverage, and high-exposure travel environments.
Loy Ehlers · Co-Founder · The Proudfoot Group loy.ehlers@theproudfootgroup.com · (252) 622-5004 Service-Disabled Veteran-Owned · Woman-Owned Small Business · Blowing Rock, NC
Composite Scenario Notice: Claire and David Mercer are composite fictional characters created for illustrative purposes only. This case study does not depict any real individual, event, or incident. All scenarios are hypothetical and intended to demonstrate the operational capabilities of Sentinel Guard and Adam's Watch in executive protection contexts. Statistics are sourced from publicly available industry reports as cited.