Anti-Sexpionage training for the private sector


In real world, marketing objectives include the creation of interest in a product or service, and the persuasion to buy it.

In the world of espionage, the objectives are the opposite. People must believe that a product does not exist, especially when they are the product. There is no clandestine training for sexpionage operatives, no art and science or misperceptions, no attribution of non-existent intentions.

"Useful idiots" must want to open their lives to new paths of excitement and adventure, visit new places, experience new cultures. Business travel, for example, builds self-confidence, brings people closer, provides with new experiences and memories, breaks routine, and allows to meet people from all over the world. Travellers must expect friendship, love, intimate relationships, adventure, surprises.

People travelling must not even think that they are vulnerable due to the limited control they exercise over their immediate surroundings, and that adversaries, including foreign governments and their agents, act on their own soil. Travellers are subject to the laws and regulations of the country they are visiting, and their citizenship will offer them little immunity, but they must only expect good food and intimacy.

Persons working for the private sector and have authorized access to sensitive information must understand the risks, and the modus operandi of elicitation agents in sexspionage operations, in order to protect themselves, their organization and their country.

We always tailor the program to meet specific requirements.

Possible building blocks of the tailor-made training

- Sexspionage
- Sexspionage, case studies

- Foreign economic collection and industrial espionage
- Elicitation
- Eliciting altruism
- Eliciting attachment
- Deflecting elicitation attempts
- Surveillance
- Recruitment by foreign intelligence services
- The targets / victims
- Who is being targeted?
- Exploitation of business activities
- Primary methods of exploitation
- Collection techniques
- Academic solicitation
- Conference, convention, or tradeshow method of contact
- Countermeasures

- Insider threat and espionage
- Weaponizing what is considered cool
- Weaponizing the integrity of IT persons
- Easy victims and elicitation
- Narcissists
- Psychopaths
- Machiavellian personalities

International travel

If you don't attract sexual partners where you live, you won't suddenly become more attractive just because you're in a different country, unless there's a hidden agenda.

Before the trip.

- Planning and Preparation.

- There are high risk countries, but there are no low risk countries.

- Who knows your travel plan? From family and business to the local embassy or consulate at the destination. Keep a document with every detail for every stage of your itinerary.

- Information about your destination.

- Familiarize yourself with local laws and customs in the areas you plan to travel. You are expected to obey their laws, dress standards, restrictions.

- Obtain specific pre-travel country risk assessments for the country you plan to visit.

- Plan your ground transportation and hotel arrangements in advance.

- Packing your bags.

- Prepare for a low-profile trip. Clothing, language, behavior, money and valuables, travel documents. Prefer culturally appropriate clothes.

- Mark your luggage labels only with the hotel address during your trip and your travel mobile telephone number.

- Take electronic devices and confidential documents in your hand luggage only. Never transport them in your checked baggage.

- Take any necessary medications with you in their original containers and keep them in your carry-on luggage (not checked baggage) during the flight.

- Take with you a doorstop. When you lock yourself into your hotel room, slip the doorstop under the door to keep intruders from being able to force the door open.

- The bring-your-own-device (BYOD) risk.

- No, you can not take your business laptop and devices with you. You need "travel laptop" and "travel devices".

- Harden the travel laptop and travel devices. Authorized hardware, software, applications. Updates, security patches and service packs.

- Add to the travel devices important contacts and phone numbers (banks, cards, embassies, diplomatic missions, home emergency numbers, destination emergency numbers).

- Understand encryption.

- Cloud security, remote access.

- Will you share in Facebook, LinkedIn, Twitter etc. your travel plans? We strongly believe you must not, especially before or during the trip.

- Travel safety and security tips.

During the trip.

-Have no expectation of privacy in hotels, airplanes, offices, or public spaces. All your words and all information you send electronically can be intercepted.

- Keep a low profile. Do not draw attention.

- Taxi, transport service, private car, rental car.

- Travelling by plane, by train, by bus, by boat.

- Special risks for women on business trips.

- Alcohol und Drugs.

- No, the hotel Wi-Fi is not secure. Wi-Fi networks are often controlled by intelligence and security services, and in all cases they are insecure.

- No, the hotel room is not secure.

- No, you must not leave your laptop or device in the room unattended.

- No, if you lock your laptop down to an immovable object with a cable lock, you do not protect your data.

- No, laptops and devices left in your room can not be considered secure anymore.

- Be familiar with the hotel lay-out.

- Dealing with Business Partners.

- Dealing with the authorities and the police.

- Do not take your passport out of your hotel. Take a copy instead.

- Your conversations in the hotel room may not be private or secure.

- Foreign intelligence services screen incoming visitors and identify persons of intelligence interest. They have agents in hotels that can monitor everything you say and do. Electronic eavesdropping is easy in airlines, in hotel rooms, taxis, and meeting rooms.

- Do not use non-company computers to log into your company’s network. Always consider any information conveyed through a non-company computer to be compromised, even if it is encrypted.

- Do not allow foreign electronic storage devices to be connected to your computer or phone. They may contain malware or automatically copy your stored electronic data. Do not use thumb drives given to you – they may be compromised.

- Deal with reputable currency exchange officials to avoid the risk of receiving and then paying with counterfeit currency.

- Do not leave drinks unattended. Someone could slip a drug into it.

- Avoid offers of sexual companionship; it often leads to a room raid, photography, and blackmail.

- Do not accept rides from strangers or new acquaintances.

- Be suspicious of an encounter with an unknown local national who strikes up a conversation and wants to practice English or other language, talks about your country of origin or your employment, buys you a drink, talks to you about politics, or uses other excuses to begin a "friendly" relationship.

- Do not bring in or purchase illegal drugs or pornography.

- Do not assist persons that are introduced as political or religious dissidents, and persons that need protection for any reason.

- Do not accept packages or letters for delivery to another location.

- What we must do, what we must avoid.

After the trip.

- Change all your passwords.

- Check electronic devices for malware.

- Report any unusual circumstances or noteworthy incidents to your business security officers.

- Your laptop and devices must be examined, to ensure they are not compromised.

Methods used by foreign intelligence services to obtain information.

- 1. Elicitation: An effort in which a seemingly normal conversation is contrived to extract information about individuals, their work, and their colleagues.

- 2. Eavesdropping: Gathering information by listening in on private conversations.

- 3. Bag Operations: Efforts to steal, photograph, or photocopy documents, devices, laptops. This could occur in your hotel room, in an airport, in a conference room, or in any other situation where the opportunity presents itself and your materials are vulnerable.

- 4. Electronic Interception: Use of devices to electronically monitor an individual’s use of modern telecommunications.

- 5. Technical Eavesdropping: Use of audio and visual devices, usually concealed in hotel rooms, restaurants, offices, cars, airplanes.

- 6. Sexspionage: Agents that use the art of seduction as a first step for a blackmail or bribery operation.

Case studies (suitable for the client).

- What has happened?

- Why has it happened?

- Which were the consequences?

- How could it be avoided?

Closing remarks and questions.

Target Audience, Objective

The program is designed for persons working for the private sector and have authorized access to sensitive data. It has the objective to give a good understanding of the risks, and assist them in protecting themselves, their organization and their country.

Delivery format of the training program

a. In-House Instructor-Led Training,
b. Online Live Training, or
c. Video-Recorded Training.


Our instructors are working professionals that have the necessary knowledge and experience in the fields in which they teach. They can lead full-time, part-time, and short-form programs that are tailored to your needs. You will always know up front who the instructor of the training program will be.

Christina Lekati, psychologist, social engineering training expert, can also lead this class. To learn about her you may visit:

Christina Lekati, Social Engineering Training Expert

Terms and conditions

You may visit: