The Security Company Experts Have Trusted for Over 25 Years.

Chesley Brown was founded as an elite security consultancy. We provide consultants, advisors, uniformed officers, electronic guarding and corporate investigations to some of the world's most iconic properties. Find out what has made us the preeminent security management company in the world for over 25 years.

Learn How We Can Help Your Business »

Our Approach

Utilizing our vast resources, we can efficiently identify potential risks and identify powerful cost-effective solutions customized around your business.


A different approach to security management.



We draw upon our years of knowledge in order to create tailored security programs that fit each client. This starts by understanding their need.

Learn More


Chesley Brown officers, armed and unarmed, are highly trained, customer-focused, and professionally managed. 

Learn More


There comes a time that every company will require some type of investigation and business intelligence. When that time comes it requires a valued partner to guide you through the many areas and specialties in investigations.

Learn More

Award Winning Service

When you have serious questions about your security, the answer is Chesley Brown. With over 3 decades of real-world security expertise in Healthcare, Education, Corporate, Government, Retail, Industrial, and Cultural Properties worldwide, there is only one company that has the experience and flexibility to respond to any threat quickly and appropriately.

F-348-G SAFETY Act DTE Mark

2017 Department of Homeland Security's SAFETY Act designation for counter-terrorism training.


The highest recognition given to employers for support of employees who serve in the National Guard and Reserve.


Georgia state award for excellence in Public Safety given for our S.A.M. program.


Recipient of the 2006 Excellence in Community Service Awards given by Georgia Trend Magazine.

Security Updates

School Security Back in Focus

Oct 6, 2016

The recent school shooting at Townville Elementary School in South Carolina that left two students and a teacher wounded hearkened back memories of that fateful December day in 2012 when 20 children and six adults were gunned down at Sandy Hook. Unfortunately, one of the shooting victims, six-year-old Jacob Hall, later died as a result…

Hackers Report Apple Weakened Backup Security With iOS 10

Oct 6, 2016

Professional iPhone hackers say that Apple has dropped the ball on password security with its latest iPhone operating system, making the task of cracking the logins for backups stored on a Mac or PC considerably easier. The claim comes from Elcomsoft, a well-known Russian forensics company, whose kit was thought to have been used by…

Hackers Infect CCTV Systems in Massive Internet Attack

Oct 6, 2016

Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the vulnerability of millions of “smart” devices in homes and businesses connected to the internet.  The assaults raised eyebrows among security experts both for their size and for the machines that made…

Private Security’s Roll in Combating Terrorism Emphasized by DHS Chief

Sep 20, 2016

On the day after the 15th anniversary of the 9/11 terror attacks, U.S. Department of Homeland Security Secretary Jeh Johnson addressed attendees at the annual ASIS conference in Orlando where he stressed the importance of the relationship between the public sector and the private security community in helping to keep the nation safe from the…

Social Media, The New Cyber Weapon Of Choice

Sep 20, 2016

Cyber criminals run rampant across every social network today. We often see headlines about social marketing fails and celebrity account hacks, but they’re just the tip of the iceberg. Far worse activity takes place across these social channels, while most organizations remain oblivious and exposed. Companies’ poor social media security practices put their brands, customers,…

The Shift to Home Grown Terror

Sep 20, 2016

Fifteen years after the September 11 attacks, US anti-terror officials say the country is hardened against such well-developed plots but remains as vulnerable as ever to small and especially home-grown attacks. Counter-terror operations are under huge pressure to ferret out and disrupt plots by sympathizers of the Islamic State group and Al-Qaeda hidden by less…

Protecting the Lone Worker

Sep 20, 2016

Isolated or lone workers have always been particularly vulnerable to the criminal element as well as a varying degree of hazards depending on the nature of the work or task and the given environment. Some examples include closing retail establishments at the end of the day, convenience stores or gas stations, parking structures, remotely located…

New Cyber Fraud Method Targets Business Email

Sep 8, 2016

An Internet-security firm, SecureWorks Inc. offered new insights into the perpetrators behind an increasingly popular type of cyberfraud targeting small businesses, tracing the attacks to Nigerians involved in earlier types of email scams. In one variant of the scheme, said criminals break into email accounts and change bank-account information to capture payments intended for suppliers.…

Hackers Targeting Phones for Mobile Bank Heists

Sep 8, 2016

Cyberthieves have a new way to hack into consumer bank accounts, through their mobile phones. Malicious software programs with names like Acecard and GM Bot are gaining popularity around the world as criminals look for new and lucrative ways to attack the financial-services industry.  According to law-enforcement officials and cybersecurity specialists, cyberthieves are using malware…

Video Surveillance a Rapidly Growing Aspect of Urban Landscape

Sep 8, 2016

The deployment of urban video surveillance is the fastest growing segment of the video world. The expansion in large metropolises to smaller burgs is unrelenting. In fact, former New York Mayor Michael Bloomberg once said that Americans should get used to “more visibility and less privacy,” because he predicts that “there will be cameras every…

Making the Case for Gunshot Detection in Schools

Sep 8, 2016

As schools remain a primary target for attacks, it is no surprise that protecting students, teachers, and safe learning spaces has become a high priority throughout the United States. It is therefore easy to see why interest in gunshot detection systems for schools has risen. In fact, legislators in both Massachusetts and Virginia introduced bills…

Laptop Used to Steal Over 100 Vehicles

Aug 17, 2016

Two men were arrested and accused of using a laptop computer and pirated software to steal more than 100 vehicles. It is believed the pair exploited an electronic vulnerability in the vehicles to advance auto theft into high-tech crime.  The suspects focused on new Jeep and Dodge vehicles, which attract big money on the black…

Can Technology Cure the Distracted Driving Disease it Created?

Aug 17, 2016

Driving while socially distracted is one of the most life threatening issues about our relationship to technology, and yet, in an ironic twist, the very thing that caused the problem may be the ultimate solution.  A number of technologies have been developed to try to eliminate potential distractions from our smartphones. And drivers, at least…

Glaring Hole Found in EMV Card Chip Security

Aug 17, 2016

Computer researchers have found yet another flaw in the upgrade to the chip-based credit cards in the United States. The chip on these credit cards have been praised for making them nearly impossible to counterfeit. While the cards also contain a magnetic strip, that strip is supposed to tell the payment machine to use the…

New Cyber Incident Severity Schema

Aug 17, 2016

The Cyber Incident Severity Schema is the latest in a series of moves by the Federal Government that confirms a clear focus on protecting the U.S. from cyber threats. The moves have been varied, from committing to hiring thousands of cyber security professionals to creating and naming members of a cybersecurity commission to extending the…

Hospital Active Shooter – The “Cease to Exist” Plan

Aug 1, 2016

When Michael D’Angelo, CPP, was tasked with creating an active shooter response plan for six Miami-area hospitals, he turned to the U.S. Department of Homeland Security’s (DHS) “Run. Hide. Fight.” training. At the time, D’Angelo was the manager of emergency preparedness and security for Baptist Health South Florida, which has hospital facilities in three counties.…

The Dangers of “Free” Wi-Fi

Aug 1, 2016

Avast Software, maker of mobile and PC security programs, revealed results of a Wi-Fi hack experiment conducted at various locations around the Republican National Convention site in Cleveland to demonstrate how risky it can be to connect to public Wi-Fi. The experiment, performed by Avast’s security researchers, revealed that over a thousand convention attendees were…

Auto Makers Join Forces to Fight Hackers

Aug 1, 2016

In an unusual announcement, 15 carmakers, comprising 98 percent of the vehicles now on the road, said they’ve joined forces in the Automotive Information Sharing and Analysis Center (Auto-ISAC) to hold a “hacking attack drill”. Its purpose: to fight cyberinvaders who could literally take control of your steering wheel and use your vehicle to commit…

Arrests Made As Police Crackdown on On-Line Threats

Aug 1, 2016

State and Federal authorities are ramping up scrutiny of on-line threats.  A number of people have been arrested in recent weeks for online threats against police in what appears to be a crackdown by officials after the killings of officers in Dallas and Baton Rouge, La. But whether the charges will turn into criminal cases,…

PIN’s and Passcodes Able to be Stolen from Wearable Tech

Jul 20, 2016

Researchers from Binghamton University and the Stevens Institute of Technology have developed an algorithm that is able guess PINs and passwords with stunning accuracy based solely on motion data collected by modern wearables such as smartwatches and fitness trackers. Yan Wang, assistant professor of computer science at the Thomas J. Watson School of Engineering and…

Where We Are

Chesley Brown provides a wide range of security services to clients in more than 29 states and 3 countries to include South America, Asia and Europe.

Corporate Heaquarters
1190 Winchester Parkway
Atlanta, GA 30080

Operational Headquarters
8301 State Line Rd.
Kansas City, MO 64114

(888) 711-7644

(770) 436-8511 – fax

Get in Touch!

Chesley Brown believes security is more than just placing guards on post and training. It is continually maintaining a culture of forward thinking and innovation. It is a philosophy of listening to our clients and providing the best security solutions for their situation. When you have serious questions about your security, the answer is Chesley Brown.

Please enter your name.
Please enter a valid email.
Please enter a valid phone number.
Please enter a message.

How can Chesley Brown help you?