ABOUT
OPSEC4LIFE
Opsec4Life is South Florida’s leading security consulting and private investigations firm. We offer in-depth security consultation to companies, schools, and private individuals regarding safety considerations to implement in order to reduce and/or eliminate possible threats. The company provides investigative services to any person or entity in need of a discreet and confidential investigation. Our executive leadership are prior career federal criminal investigators who have worked all over the world.
Jay Meehan
President/Owner of OPSEC4LIFE Inc. FL License Number: A3200025
From 1989 to 1992, Jay served his country as a Security Policeman for the United States Air Force. He served during the Gulf War and was deployed to the Middle East as part of Operation Provide Comfort.
​
From 1996 - 2020, Jay was employed by the United States Marshals Service (USMS). During his time with the USMS, he conducted criminal investigations with targets all over the world. He supervised several Violent Fugitive Task Forces. He also created and oversaw a Gang Enforcement Task Force. Jay spent 8 years on Organized Crime and Drugs Task Forces. He also served as an Acting Chief at a U.S. Intelligence Center. For over 15 years, Jay served as a member of the USMS Financial Surveillance Unit. He provided executive protection for Federal Witnesses, Federal Jury’s, Federal Prosecutors, and Federal Judges to include members of the U.S. Supreme Court. He was assigned to the USMS/Miami and USMS/Raleigh Special Response Teams. Jay retired in 2020 as the Mid Atlantic Regional Coordinator for the USMS Organized Crime and Drug Enforcement Task Force.
The Meaning of Opsec4Life
Operational Security (OPSEC) is a method of operation created by the U.S. Military during the Vietnam War and is still utilized today. It has also been adopted by almost every federal law enforcement agency and is utilized to protect the integrity and safety of operations, personnel, and government assets.
​
The element of surprise has always been a proven effective advantage during military/tactical operations. Any military unit that can strike an opponent when they are unaware of the strike and are not prepared to effectively defend themselves have an advantage that is almost impossible to overcome. By the same token, if your opponent is aware of the strike and has fortified it’s position, they now have an advantage that is almost impossible to overcome.
​
During the Vietnam War, the U.S. Military had trouble identifying how knowledge of their tactical missions were being leaked. The Joint Chiefs of Staff authorized an investigation named Operation Purple Dragon to investigate every aspect of ongoing combat operations from the planning stages to the actual execution. Based on the investigation, it was determined that the leaks were due to inadvertent behaviors of the U.S. military. Once operations security practices were set in place to resolve the inadvertent leaks of information, the military was able to conduct many successful tactical operations. Based on the success of Operation Purple Dragon, the Joint Chiefs implemented Operational Security procedures in every branch of the military. These same procedures were later mandated for all government agencies and are utilized every day by law enforcement agencies of the U.S. Government. These OPSEC standards identify what is critical information, analyze possible threats to this information, analyze any vulnerabilities, assess possible risks, and apply countermeasures to protect the information.
​
Applying these same standards to your business and personal life can be highly beneficial to your success and safety. They can help identify, protect, and eliminate vulnerabilities that today’s criminals attempt to discover. Opsec4Life’s trained personnel have applied these standards to their work and personal lives for years and are eager to meet with clients and help establish these standards in their lives to help protect their businesses, employees, and families from violent criminals that are lurking and seeking out vulnerabilities that offer a window for them to exploit to steal or harm the vulnerable.