For Assistance Call 24hr - 800-828-9198
ICS of Colorado, LLC (Aurora Office)
2851 S. Parker Rd. #1044
Aurora, CO 80014
Denver Office
4610 S. Ulster St. #150
Denver, CO, 80237


Threat Assessment (Secret #1)
A collection of data and intelligence from all relative information sources to a specific imminent risk or threat. Threats need to be identified, validated, and classified. Recommended countermeasures should be based on the findings.

Site Advance (Secret #2)
An Advance entails logistics planning and coordination of events that will occur at any given destination. Typically an advance will be part of an Executive Protection Detail and will occur ahead of or in advance of the protective detail and the client. A proper Advance can be very simple to complex. Prior to any protective detail, a Threat Assessment and Site Advance must be completed to ensure a complete and comprehensive security package.

Executive Protection Detail (Secret #3)
Executive Protection is the integration and deployment of physical and technical security measures and countermeasures to protect the life of the Protectee(s), corporate assets, or property. In short, Executive Protection is a 1-8 member team or more, that is assigned to provide close proximity protection to the client, their families and their assets.

Site Survey/ Security Assessment/ Security Survey
Refers to identification and evaluation of exploitable vulnerabilities, risks, and exposures from internal or external sources which may exist or could exist pertaining to a site, organization and or its assets or a person. A survey is also conducted on an existing security system and security measures that are already in place.

Risk Analysis/ Security Vulnerability/ Consulting
A detailed examination is performed to understand the nature of unwanted negative consequences to human life, health, property, or the environment. It is an analytical process to provide information regarding undesirable events.

Investigations/ Backgrounds/ Skip Tracing
Investigation is the process of inquiring into a matter through research, follow-up, study, or formal procedure of discovery. If your not sure about an employee, family member, or other acquintenance a background check can be performed. A background may include criminal and work history. Skip Tracing is a term used to describe the process of locating a person's whereabouts for any number of purposes.

Surveillance/ Counter Surveillance/ Security Systems
These methods and systems are used to detect any offensive threats or potential dangers that are planned by any hostile individual or group. Security systems are typically closed circuit systems which utilize the latest in digital and analog technologies. The security footage may be viewed by a security monitoring company, on site at the video recording station, or on the internet with a private and secure web address.

TSCM- Technical Security Counter Measures (Bug sweeping)
The art of locating hidden, and sometimes in plain view, electronic listening devices. Some of our highly trained specialists can perform “detective sweeps” of your home, office, vacation destination, or vehicle. A physical and audio sweep is conducted. As part of a very comprehensive security package this asset protecting procedure can offer peace of mind that no one is listening in on important conversations.

Armored Vehicles/ Safe Rooms
For those clients that desire the ultimate in protection, while traveling on the road or in their residence, an armored vehicle or safe room is an option that is available. Certain high risk environments such as overseas require the luxury and peace of mind of an armored vehicle for safe transportation. Almost any vehicle can be customized to include the latest in armor technology. Safe rooms are an increasing trend among low and high profile individuals. Clients typically desire a safe room for themselves and their family members at their place of residence as part of an escape and evasion plan.