The security management company experts have trusted for over 30 years.

Chesley Brown was founded as an elite security consultancy. We provide and manage security consultants, advisors, uniformed officers, electronic guarding and corporate investigations to some of the world's most iconic properties. Find out what has made us the preeminent security management company in the world for over 30 years.

Learn How We Can Help Your Business »

Our approach to security management

Utilizing our vast resources, we can efficiently identify potential risks and identify powerful cost-effective solutions customized around your business.

Click below to view a short film about Chesley Brown's innovative approach to security management.


A different approach to security management.



We draw upon our years of knowledge in order to create tailored security programs that fit each client. This starts by understanding their need.

Learn More
security management and uniformed officers


Chesley Brown officers, armed and unarmed, are highly trained, customer-focused, and professionally managed. 

Learn More
security management and investigations


There comes a time that every company will require some type of investigation and business intelligence. When that time comes it requires a valued partner to guide you through the many areas and specialties in investigations.

Learn More

Award Winning Service

When you have serious questions about your security, the answer is Chesley Brown. With over 3 decades of real-world security expertise in Healthcare, Education, Corporate, Government, Retail, Industrial, and Cultural Properties worldwide, there is only one company that has the experience and flexibility to respond to any threat quickly and appropriately.


2017 Department of Homeland Security's SAFETY Act designation for counter-terrorism training.


The highest recognition given to employers for support of employees who serve in the National Guard and Reserve.


Georgia state award for excellence in Public Safety given for our S.A.M. program.


Recipient of the 2006 Excellence in Community Service Awards given by Georgia Trend Magazine.

Security Updates

Hackers Report Apple Weakened Backup Security With iOS 10

Oct 6, 2016

Professional iPhone hackers say that Apple has dropped the ball on password security with its latest iPhone operating system, making the task of cracking the logins for backups stored on a Mac or PC considerably easier. The claim comes from Elcomsoft, a well-known Russian forensics company, whose kit was thought to have been used by…

Hackers Infect CCTV Systems in Massive Internet Attack

Oct 6, 2016

Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the vulnerability of millions of “smart” devices in homes and businesses connected to the internet.  The assaults raised eyebrows among security experts both for their size and for the machines that made…

Private Security’s Roll in Combating Terrorism Emphasized by DHS Chief

Sep 20, 2016

On the day after the 15th anniversary of the 9/11 terror attacks, U.S. Department of Homeland Security Secretary Jeh Johnson addressed attendees at the annual ASIS conference in Orlando where he stressed the importance of the relationship between the public sector and the private security community in helping to keep the nation safe from the…

Social Media, The New Cyber Weapon Of Choice

Sep 20, 2016

Cyber criminals run rampant across every social network today. We often see headlines about social marketing fails and celebrity account hacks, but they’re just the tip of the iceberg. Far worse activity takes place across these social channels, while most organizations remain oblivious and exposed. Companies’ poor social media security practices put their brands, customers,…

The Shift to Home Grown Terror

Sep 20, 2016

Fifteen years after the September 11 attacks, US anti-terror officials say the country is hardened against such well-developed plots but remains as vulnerable as ever to small and especially home-grown attacks. Counter-terror operations are under huge pressure to ferret out and disrupt plots by sympathizers of the Islamic State group and Al-Qaeda hidden by less…

Protecting the Lone Worker

Sep 20, 2016

Isolated or lone workers have always been particularly vulnerable to the criminal element as well as a varying degree of hazards depending on the nature of the work or task and the given environment. Some examples include closing retail establishments at the end of the day, convenience stores or gas stations, parking structures, remotely located…

Hackers Targeting Phones for Mobile Bank Heists

Sep 8, 2016

Cyberthieves have a new way to hack into consumer bank accounts, through their mobile phones. Malicious software programs with names like Acecard and GM Bot are gaining popularity around the world as criminals look for new and lucrative ways to attack the financial-services industry.  According to law-enforcement officials and cybersecurity specialists, cyberthieves are using malware…

Video Surveillance a Rapidly Growing Aspect of Urban Landscape

Sep 8, 2016

The deployment of urban video surveillance is the fastest growing segment of the video world. The expansion in large metropolises to smaller burgs is unrelenting. In fact, former New York Mayor Michael Bloomberg once said that Americans should get used to “more visibility and less privacy,” because he predicts that “there will be cameras every…

Making the Case for Gunshot Detection in Schools

Sep 8, 2016

As schools remain a primary target for attacks, it is no surprise that protecting students, teachers, and safe learning spaces has become a high priority throughout the United States. It is therefore easy to see why interest in gunshot detection systems for schools has risen. In fact, legislators in both Massachusetts and Virginia introduced bills…

Laptop Used to Steal Over 100 Vehicles

Aug 17, 2016

Two men were arrested and accused of using a laptop computer and pirated software to steal more than 100 vehicles. It is believed the pair exploited an electronic vulnerability in the vehicles to advance auto theft into high-tech crime.  The suspects focused on new Jeep and Dodge vehicles, which attract big money on the black…

Glaring Hole Found in EMV Card Chip Security

Aug 17, 2016

Computer researchers have found yet another flaw in the upgrade to the chip-based credit cards in the United States. The chip on these credit cards have been praised for making them nearly impossible to counterfeit. While the cards also contain a magnetic strip, that strip is supposed to tell the payment machine to use the…

Hospital Active Shooter – The “Cease to Exist” Plan

Aug 1, 2016

When Michael D’Angelo, CPP, was tasked with creating an active shooter response plan for six Miami-area hospitals, he turned to the U.S. Department of Homeland Security’s (DHS) “Run. Hide. Fight.” training. At the time, D’Angelo was the manager of emergency preparedness and security for Baptist Health South Florida, which has hospital facilities in three counties.…

The Dangers of “Free” Wi-Fi

Aug 1, 2016

Avast Software, maker of mobile and PC security programs, revealed results of a Wi-Fi hack experiment conducted at various locations around the Republican National Convention site in Cleveland to demonstrate how risky it can be to connect to public Wi-Fi. The experiment, performed by Avast’s security researchers, revealed that over a thousand convention attendees were…

Auto Makers Join Forces to Fight Hackers

Aug 1, 2016

In an unusual announcement, 15 carmakers, comprising 98 percent of the vehicles now on the road, said they’ve joined forces in the Automotive Information Sharing and Analysis Center (Auto-ISAC) to hold a “hacking attack drill”. Its purpose: to fight cyberinvaders who could literally take control of your steering wheel and use your vehicle to commit…

Arrests Made As Police Crackdown on On-Line Threats

Aug 1, 2016

State and Federal authorities are ramping up scrutiny of on-line threats.  A number of people have been arrested in recent weeks for online threats against police in what appears to be a crackdown by officials after the killings of officers in Dallas and Baton Rouge, La. But whether the charges will turn into criminal cases,…

PIN’s and Passcodes Able to be Stolen from Wearable Tech

Jul 20, 2016

Researchers from Binghamton University and the Stevens Institute of Technology have developed an algorithm that is able guess PINs and passwords with stunning accuracy based solely on motion data collected by modern wearables such as smartwatches and fitness trackers. Yan Wang, assistant professor of computer science at the Thomas J. Watson School of Engineering and…

Reasoning Behind Using Explosives to End Standoff

Jul 20, 2016

It was a little after 1 a.m. on July 10th when Dallas Police Chief David Brown told Mayor Mike Rawlings that he planned to kill the sniper who gunned down five police officers using an explosive charge at the end of a robotic arm.  Police departments across the country have been training for that very…

Report Shows FDIC Hid Computer Hack from Investigators

Jul 20, 2016

The House of Representative’s Science, Space and Technology Committee recently released an investigative report on the FDIC. The report presents the FDIC’s bank regulators as technologically “inept” and “deceitful”.  According to congressional investigators, the Chinese government hacked into 12 computers and 10 backroom servers at the FDIC, including the incredibly sensitive personal computers of the…

Pokémon Go Can be a Threat to Users

Jul 20, 2016

In a very short amount of time, a popular new game has created a list of new problems and even some opportunities. Pokémon GO uses your phone’s GPS and clock to detect where you are and makes Pokémon “appear” around you so you can use your phone’s camera to “catch” them. As you move around,…

The Costly Defense Against Drones

Jul 6, 2016

Past three heavy, locked doors, in a cavernous, sterile room in a nondescript manufacturing plant in Dublin, workers are assembling a secret weapon for the federal government. Well, sort of secret. But the Battelle facility is harnessing a technology that takes control in a way. It’s called the Drone Defender, a hand-held jamming device that…

Where We Are

Chesley Brown provides a wide range of security services to clients in more than 29 states and 3 countries to include South America, Asia and Europe.

Corporate Heaquarters
1190 Winchester Parkway
Atlanta, GA 30080

Operational Headquarters
8301 State Line Rd.
Kansas City, MO 64114

(888) 711-7644

(770) 436-8511 – fax

Get in Touch!

Chesley Brown believes security is more than just placing guards on post and training. It is continually maintaining a culture of forward thinking and innovation. It is a philosophy of listening to our clients and providing the best security solutions for their situation. When you have serious questions about your security, the answer is Chesley Brown.

Please enter your name.
Please enter a valid email.
Please enter a valid phone number.
Please enter a message.

Please check the captcha to verify you are not a robot.

How can Chesley Brown help you?