At Action This Day, we are dedicated to safeguarding your campaign’s integrity with unparalleled expertise and strategic insights.

Why We Exist

In some of the darkest days of the Second World War, Alan Turing and his team of codebreakers were desperate for the resources they needed to successfully break German codes and save millions of lives. When Turing’s superiors refused to provide the necessary resources, Turing wrote a letter directly to Prime Minister Winston Churchill pleading for assistance.

Churchill, who instantly recognized the importance of Turing’s work to the war effort, immediately authored an urgent memo to Turing’s superiors insisting that every one of Turing’s requests be granted.  Churchill considered the matter so urgent that at the top of the memo, written in red letters, “Action This Day.”

Over the last several election cycles, we’ve seen a dramatic increase in attempts by right-wing extremists to infiltrate progressive and Democratic operations and campaigns to sabotage, undermine, or otherwise discredit them.

As the GOP has come to realize that its grip on power faces more and more challenging paths to victory due to changing demographics and electoral math, so too has its use of these subversive tactics increased. Your campaign has invested so much because there’s so much at stake. Don’t allow subversive threats to jeopardize your mission. Take “Action This Day!”

Our Unique Expertise

Comprehensive Security Solutions

Our team brings together rare and complementary expertise across three critical domains. In intelligence and security operations, our operatives draw on backgrounds in military intelligence, the FBI, and federal intelligence agencies such as the Department of Defense, the Defense Intelligence Agency, and the Central Intelligence Agency. In campaign field operations, we offer a deep, firsthand understanding of canvassing, field program logistics, and the complex mechanics of political campaigns. Finally, our cybersecurity and data analysis specialists provide the technical insight needed to safeguard information systems and ensure the highest standards of data integrity across all operations.

Real-World Experience

Proven Track Record in High-Stakes Environments

Our operatives bring a rare combination of experience and precision to every engagement. They have conducted counterintelligence operations for federal agencies, led large-scale field programs for political campaigns, and carried out clandestine activities in politically sensitive, high-stakes environments. Their expertise extends to developing comprehensive security protocols designed to protect sensitive operations and ensure organizational integrity.

Unlike general security consultants, our team understands the unique realities of political campaigns, rapid scaling with temporary staff, managing a high-turnover mix of paid and volunteer workers, operating under tight timelines and limited resources, and defending against hostile opposition seeking infiltration or sabotage. We also recognize the added pressure of public scrutiny and media attention, which demands not just effective security measures, but strategic discretion and trustworthiness at every level.

Strategic Investment in Security

Investing in a professional security assessment is crucial for protecting the resources you’ve committed to your campaign. Our services are competitively priced and tailored to meet your specific needs and budget. We offer a range of engagement options, from comprehensive security assessments to rapid response evaluations, ensuring that you receive the best value for your investment.

Our pricing structure is designed to be flexible and scalable. For a comprehensive security assessment lasting 1-2 weeks, we offer competitive rates that reflect the depth and breadth of our services. For urgent needs, our rapid response evaluations can be conducted within 2-4 days. We offer custom pricing based on the specific needs of your program.

Frequently Asked Questions

Explore answers to common questions about our services and compliance measures.

Do your operatives conduct surveillance of our staff?

No. Our operatives may work within your field program as legitimate temporary employees to evaluate system effectiveness, but they do not conduct surveillance of individual employees for disciplinary purposes. Our assessments focus on identifying system gaps and protocol weaknesses, not documenting individual employee behavior.

Will you identify specific problematic employees?

Our reports focus on systemic issues and security vulnerabilities, not individual employee performance. If our data analysis identifies patterns suggesting further review is warranted, we flag those patterns for your internal investigation. We provide the intelligence you need to know where to look; your internal team makes personnel decisions.

How is your testing conducted?

Our operatives apply for positions within your program using their real identities and credentials. They complete your standard processes and document their experiences. One method we use is submitting test data to evaluate whether your quality control systems function effectively. We assess system responsiveness, not individual performance.

Are your services legal and compliant?

Yes. Our current service offerings are structured to comply with applicable laws and regulations. We focus on security assessment, policy development, training, and data analysis, professional consulting services that do not require private investigator licensing. We do not conduct activities that would trigger licensing requirements until appropriate licenses are obtained.

What happens if you identify security issues?

We provide you with a comprehensive report documenting vulnerabilities, risk assessment, and prioritized recommendations. You decide which recommendations to implement and how to address any issues identified. We can provide ongoing consultation to support your implementation efforts.

Can you work in multiple states?

Yes. Our assessment and consulting services can be provided nationwide. For data analysis and remote quality control services, location is not a limiting factor. For on-site assessments, we deploy to wherever your program operates.

How quickly can you deploy?

For rapid response needs, we can typically deploy within 48-96 hours of engagement. For comprehensive assessments, we recommend 1-2 weeks lead time to properly prepare. For ongoing services like remote QC, we can begin immediately after engagement finalization.

Who will see the results?

Reports are confidential and delivered only to designated client leadership. We maintain strict confidentiality throughout and after engagements. Your campaign or organization controls all information and deliverables.

How do I get started?

Contact us for a confidential consultation to discuss your specific needs, concerns, and objectives. We’ll provide a customized proposal outlining the scope, timeline, deliverables, and investment, helping you take proactive steps to secure your campaign.

Take Action Today

Don’t wait until it’s too late. Protect your campaign with the expertise and dedication of Action This Day. Our team is ready to provide you with a tailored security assessment that addresses your unique needs. Contact us now to schedule a confidential consultation and take the first step towards securing your campaign’s success.