Dell Spry is an attorney by education a investigator by passion. He has been in law enforcement for over 30 years. In that time he served in the FBI as a Supervisory Special Agent and was lead investigator on some of the most high-profile cases in the country, including the infamous Aldrich AmesCIA Spy case.Through his work in counter-espionage and counter-intelligence he earned the nickname “The Spy Catcher”. Recently, Spry was promoted to Vice President Emeritus of the Chesley Brown International’s investigative Group. As Emeritus status he remains a valued member of the Chesley Brown family and will mentor and advise as well as help solve cases. Spry is highly respected and considered a legend in Law Enforcement.
Who is Dell Spry?
Spry has been with Chesley Brown since 2018 and has played a pivotal role in the growth and success of our investigative group. In his most recent role as Managing Director, Spry was responsible for expanding the company’s investigative group and building our corporate counter-espionage unit. Under his guidance and leadership, Chesley Brown has seen tremendous growth, both in terms of revenue and profitability. He has been instrumental in developing and implementing our investigative process, which has positioned the organization for success for years to come.
In his retirement, Spry plans to spend more time with his family and continue service in his community. He intends to continue his work with the company, but in a more advisory capacity. He also hopes to use his position to help mentor the next generation of leaders at Chesley Brown. In addition, Spry plans to remain involved in his communityto include speaking about his experiences when asked and teaching when available. He hopes to use his platform to help support causes that are important to him.
Thank you, Dell, for your years of service to the Chesley Brown family, our clients and our country.
Sign up!
For industry-leading guides and analysis sign up for our blog below.
Latest News
Podcast | Risk Takers Series #04 Brad Orsini – Community-based Security
Visiting our places of worship shouldn’t be dangerous. Unfortunately, faith-based organizations are facing the difficult challenge of how to protect their congregations from religion-motivated violence, and still maintain the welcoming, open environment community members expect.…
Read MorePodcast | Risk Takers Series #3 Surveillance Detection Routes (SDR)
Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It’s a frightening thought. You’ve spent years building your business, but all it takes is one…
Read Morerisk-takers #3 Surveillance Detection Routes (SDR)
Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It’s a frightening thought. You’ve spent years building your business, but all it takes is one bad day to compromise that dream. In this week’s episode Brent sits down with FBI Special Agent (Ret.) Dell Spry to discuss surveillance detection routes, what they are, and how they can be used as a spy detector device to find out if you are under surveillance.
Read MoreHow to Prepare for Economic Risk
Best Strategies for Building Resiliency How to position your business for uncertainty If there is one aspect of business that is certain, it’s uncertainty. It might also be the understatement of the year to say…
Read Morerisk-takers #2 Terry Fisher — Electronic Countermeasures
Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business with a product or service has something a competitor or adversary could use. And if you’re being honest, you probably haven’t fully considered all the ways they might get their hands on that information. You’ve spent years building your business, but all it takes is one bad day to compromise that dream. In this week’s episode Brent sits down with FBI Special Agent (Ret.) and engineer Terry Fisher to discuss corporate espionage, electronic countermeasures (sweeps), bugging, and the common methods bad actors have used throughout history to gain access to proprietary information.
Read More