Episode: 390 |
Adam Roosevelt:


Adam Roosevelt


Show Notes


Adam is a decorated combat veteran and a cybersecurity consultant who started his career with the U.S. military; he was part of the team working on the Global War on Terrorism before starting a private practice where he advises government agencies and the private sector. He is now the CEO of A.R. International Consulting, LLC and a national news on-air analyst.

Key points include:

  • 02:53: Training with NATO and being deployed to Afghanistan
  • 07:01: Getting set up as a federal contractor
  • 10:25: Setting up an advisory board 
  • 16:14: Specific services for the private sector
  • 26:15 Asset recovery

Adam can be reached through his website, adamroosevelt.com, or through LinkedIn. You can also follow him on YouTube, and Instagram. 


One weekly email with bonus materials and summaries of each new episode:

Will Bachman 00:02
Hello, and welcome to Unleashed the show that explores how to thrive as an independent professional. I’m your host Will Bachman. And I’m excited to be here today with Adam Roosevelt, who is a cyber security consultant. And, Adam, welcome to the show.

Adam Roosevelt 00:19
I really appreciate it. Thank you for having me. Well, I’m happy to be here with you.

Will Bachman 00:23
So Adam, you got your start in cyber in the military, right? Talk to me a little bit about that experience. And you know, where you went with the military, and what kind of work you were doing?

Adam Roosevelt 00:34
Sure, well, so started about nine years ago, for me in the US military, signed up active duty started, it’s let’s see here started at 17. So I was one of the teenagers to just go straight into the US military, inserted my it cyber career profession, with through a certain regimen of training, there’s a center of excellence in Fort Gordon, I was trained there by the US military going through all of the different cybersecurity and it elements for training, so offensive, defensive architecture, policy, and just a lot of technology, the US military with us, here in the United States, and as well as in the war zone. So I continued that work after my school house training, and went and deployed to Afghanistan on the frontlines supporting operation during freedom and also operation freedoms, Sentinel, two separate campaigns to different tours, working in the cyber capacity as well, and just continuing to support the NATO allies and the mission that we had, which is really the Global War on Terrorism, and also train, advise assist within country, specifically in Afghanistan to get them to a state where we could hand over control to the government of the Islamic Republic of Afghanistan. So that’s my military career from peacetime and wartime. But I’ve been very trained, in terms of the in depth cyber security worked at the US military with us to secure their networks as well as go after adversaries.

Will Bachman 02:09
Yeah, you know, I guess, my sort of mental model of soldiers being deployed, I think of soldiers, and I think there’s probably some cooks there, and some folks operating radios, and supply chain quartermasters. But it hadn’t really occurred to me that there be cyber security professionals out there, but it makes sense. Talk to me about where were you kind of deployed and what sorts of things you were doing. For the military, there is it in a at the headquarters base camp, you’re making sure all the routers are set up properly, or you’re like out in the field, making sure that no one is hacking in where the soldiers are out. In the field. What was that work like?

Adam Roosevelt 02:53
The work is very interesting, actually will and I’ll tell you, pre Afghanistan, right before you go to the actual location, I was training with a lot of the NATO allies at the schoolhouse in a location called the Tina, Italy and it was the NATO communication Information System school. There, we put hands on all of this different technology, command post nodes, which is like satellite technology so that we have secure communications on the ground, making sure that the networks are set up correctly, so that there is no penetration capabilities from outside forces adversaries, and making sure we’re monitoring the operation to ensure that we’re able to deliver these core services that are needed to keep the comms up, make sure that we have a full understanding of the battlespace going on. So taking that training that we did with NATO, at that school, put me in Afghanistan pictured with me, now we’re their full time, full time operation in the middle of the Warzone, making sure that the systems are protected, everything has been configured, the monitoring is occurring, the network is protected on an everyday basis. So with that being said, we’re just hands on all the different tactical technology in that space and then advising the Afghans or advising the NATO allies on how to make sure their systems are also protected inside the wire, which is inside the location where we all are in the safe zone. And then as well as outside when you’re preparing for convoys as well.

Will Bachman 04:33
I guess it hadn’t occurred to me But would it be like the Taliban would be you know, working to hack and attack into the the networks or or other adversaries.

Adam Roosevelt 04:45
I will tell you that every adversary is going to work to stay at a certain pace with the others that are playing in the field. So whether it be outside or whether it be a what we call a TCL which A transnational criminal organization, everyone wants to compete in play. And if they can do something from a remote location, to degrade your ability to carry out your mission and meet your objectives, they will do that. Now, we won’t say that they are as as skilled, but they have multiple cells that they operate in. And those cells are always being financed, which some of that finance activity is going to be used to train their individuals on signal intelligence, open source collection, cybersecurity, and more. So we have to make sure that if they’re continuing to be trained, we’ve got to make sure that we’re prepared to meet them in that space to protect our assets.

Will Bachman 05:39
All right, let’s fast forward to you leaving, you know, active duty military and setting up your own consulting practice. Talk to me about talking about that transition, and what how did you end up deciding to set up your own your own practice?

Adam Roosevelt 05:56
So great question that brings me back to Afghanistan, I actually started the firm, while I was in Afghanistan, called over to a Virginia lawyer and had them set it up. And my whole thought process was that I was going to take these skill sets and deploy them in country mean in the United States, and supports the US federal government, as well as commercial and private sector clients. And I did that it was a standard process, I think, for the small business owners and the independent contractors out there, you know, it’s not an expensive process to get the paperwork done. Now you’re filed in a state of, you know, you’re Incorporated, and then you go forward with, you know, doing everything you need to do to get into the government registration systems. And then you start looking at contracts, and those systems that you can actually go after

Will Bachman 06:43
what you did walk me through that a little bit. So I know, a lot of consultants, I don’t know a lot of people that have ended up doing work for the federal government, talk me through in detail some of those administrative processes or what didn’t require to get set up as a federal contractor.

Adam Roosevelt 07:01
There’s a few things I’ll say well on this, so what we had to do was we checked the block one a few things, we registered in sam.gov. So the sam.gov registration process is critical, it really essentially puts all the administrative details into the system, so that the government can have eyes on the companies that are trying to effectively work with the government. And you’re pretty much putting that detail in that system. Once it’s there, it’s going to tell the government a few things, there’s what’s called the Nate code system, the National American industrial code system, which categorizes each firm in a specific service category. So it firm. But within that system, he will explain to you that I’m doing data processing, I’m doing scientific, technical consulting, and so forth. Once all that’s there, your company is now able to say they’re registered, they’re going to also get what’s called a cage code. That’s a code that the system assigns a company, and then that effectively allows, again, the government to find you in that system. Once you’ve passed that process. Well, you’re now in the system. Now you’ve got to go and be aggressive about going after work. or looking at trying to identify contracts that align with your services and skills, so that you can be a subcontractor with an existing contract, or a 1099. contractor. So there are different ways to kind of move into that space, but that covers the administrative side of the requirements.

Will Bachman 08:36
Okay. Talk to me about some of the clients that you’ve been serving as an independent consultant or running your own practice.

Adam Roosevelt 08:45
Sure. My first major client was the Department of Homeland Security, which was like, you know, as an independent contractor, it was amazing to be able to say, you know, at a young age, as well as a young firm’s age, that we were able to land that contract. And we worked with the Department of Homeland Security, intelligence and analysis division, and I was doing cyber work. And they assigned me to major portfolios like the national vetting Center, the National targeting center, and then I had some work within like 17 agency bodies as advising them as a service provider partners. So that was one of our big ones. And then we essentially moved on and landed some more clients in the commercial space, like law firms like Squire Patton Boggs, which really transitioned our cybersecurity away from the government focus and more into the private focus. And it’s a different dynamic that we experienced well, while we were there, because traditional cyber security, you know, network security, and all those things, spets all comments, but in the law firm world, cyber security is effectively crisis management, you know, it’s forensics for pre litigation. And trials and settlements that may come from those types of engagements. So that’s kind of some of the clients that we’ve got and some of the work that we’ve done. And that’s kind of helped us build a large portfolio to, you know, chemical ourselves in the global arena.

Will Bachman 10:17
Yeah. You mentioned to me that you have put together an advisory board for your firm Tell me about that.

Adam Roosevelt 10:25
The advisory board is a very interesting is a very interesting focus of mine. And I understood as an independent consultant at the time that it’s very difficult to compete in what we call a monopolistic environment where there’s so many consultants, there’s so many clients, there’s so many people out there, and it’s so difficult for an independent consultants to be effective, because the brand is not known. So I aligned myself with some of the key players in in the cyber Arena in the political arena, and some folks that have got a lot of experience as well as brand recognition throughout the space, so I was very successful. And building a partnership with rich global, which is owned by Governor Tom Ridge, who was the first secretary of homeland security serving on a George Bush, I was successful with reaching out to law enforcement partners like Richard Kendall, who is involved in a lot of the law enforcement equities and so forth. And I thought this would be a way for us to continue our brand and And furthermore, we continued to engage other strategic partners will, we worked with john Rutledge, who’s, you know, over the soft nod fund, he’s working in the Investment Committee, so we’re diversifying our connections and our ability to advise partners reached out to folks in South Africa, we worked with Ranjan Naidu, who is tied in the Middle East very deeply into healthquest. And we were successful with some more interesting partnerships, like with Mr. James T’s, who was the CEO of fresh and easy and was also known, I think, to the viewers, as the CEO of blockbuster, and 711. Why is this relevant, though, is because we need to diversify our round table. As an independent consultant, there’s so many doors, and we want to make sure that our brand is put through multiple doors to be recognized. And that’s the reason we formed this board of advisors as more of a coalition of knights to help push our firm further into the market.

Will Bachman 12:27
Yeah, that’s great. And what what sort of, can you talk a little bit about the arrangement with the advisors? Is it? Do they like you meet once a quarter? Or do they help make introductions to potential clients? Like, how what what role do they play?

Adam Roosevelt 12:43
Sure. So we have what’s like, considered to be a tier a high tier of selected individuals that we just named off there. And really, I’m the Chief Business developer. So because they have, and I think this would be useful for the folks that would be listening is because they have such large corporations, and they’ve got so much going on, I team, my core operations team that does business development would be doing the, on the front line work. And then once we have an opportunity, we pull in a specific advisor to come to do the capture moments. And that’s how we’ve arranged this, and now they get a percentage of the deals. So they get, it’s a kill what you eat type of mentality, but essentially, they’re going to get a percentage of the deal, whether it be 20% of the deal. And then those contracts can range, you know, from a one time contract, or it could be a yearly contract, or even a retainer fee based relationship. So everyone will be fed efficiently. And then we also create what’s called an incentive program. So if they bring me a piece of business, they’re going to get a higher margin percentage, and then we’ll work it with our operations team. And what will happen will is that every contract that stems from that one introduction, we’re going to pay them for each of those contracts ongoing. And it’s been a very successful model for me. And I’ve had to be very dynamic as is as a leader in this space, but also incentivizing folks like fish who are at the highest food chain markets, if you will, to keep them fed, keep them interested and keep them on the team long term. That’s our process.

Will Bachman 14:23
Now, tell me about your firm itself. Do you have some subcontractors Do you have some employees? Just tell me about the structure of your firm?

Adam Roosevelt 14:34
Yeah, we have a mixture of few. We have 10 employees right now. And we also have a side set of some other independent contractors that we use for various functions and components of the firm. So and then a plus the addition of the board of advisors. So that’s kind of the dynamic hybrid model we decided to put together. And then what’s important here will is the scalability model So we had to be Lean and Agile to survive. So that’s our focus. But at the same time, we also needed to be able to scale and touch globally. And that’s the reason we adopted a coalition of the board of advisors to be able to service any of those requests that come in from anywhere around the world.

Will Bachman 15:21
Wait, let me let me see if I’m doing the math correctly. Here. You said you, you started this whole adventure about nine years ago when you join the military, when you were 17. So if I do the math, 17 plus nine, that’s 26. So you’re 26 years old, and you’ve got a firm with 10 employees and a bunch of subcontractors. That’s a that’s pretty impressive. 28 will,

Adam Roosevelt 15:43
I might have my map might have been a mess, actually. Alright, okay. going on. 29.

Will Bachman 15:49
All right. Fantastic. Well, congratulations. This is really quite quite incredible story that you’re you’re putting together. Talk to me about some of the private sector work, I’d like to explore, you know, the types of search services you offer a little bit more specifically. So let’s say you’re working with, you said you you work with some law firms. Give me some examples of specific services that you’re providing.

Adam Roosevelt 16:14
Okay, sure, I will redact on the go. But I will give you some of the high level. So for example, there are elements of a law firm that are well understood for mostly the practice area. So focusing on the practice areas, government wide government investigations and white collar crime, what do they care about? They care about due diligence checks, we’ve been also asked to do asset search and recovery. So let me give you an example. There was an individual who stole $12 million in a country outside of the United States, that individual left his host country and came to the United States. And let’s just say, Wisconsin, the individuals that he stole money from was an actual bank, that bank wanted to pursue individual acts, and reached out to law firm to support them with potential litigation activity. That law firm essentially reached out to us to give us the grand picture. But the requirement is and was to effectively locate this individual, we need to get them down to a specific location, then from the location piece, there could be a conversation of serving Him. So Process Server request that they were able to pull that off. But before that, they wanted to gather details about his assets, his finances. So what did our firm do our firms responsible for locating assets, not just within his particular realm of operation, but also with his family, a lot of people like to hide assets with kids and wives and brothers. So we were able to do the due diligence check to provide the full picture of where his finances were, where he may have been tried to covertly hide finances. And we provided a full asset search and recovery service for the law firm. That’s, that’s one example of some of the work we do in the due diligence speak of the due diligence space. And then there’s other work that would entail cybersecurity. So cyber security crisis. second story here, I’ll end it pretty quick, but I’ll give you the high level is that law firm had a client that had just recently been hacked. And the unfortunate situation was it was a ransomware attack, they were looking for $12 million or more, that needed to be deposited into a bitcoin wallet. And law firm says, Hey, we have a trusted vendor who can carry out set payment, if you will. But before that, they actually did have a cyber security service company, but they were not allowed to, within their policies, execute ransomware negotiations. So we specialize in compliance, obviously, because you can’t just execute anything in terms of the ransomware negotiation without having a deep understanding of that, the advising them on the insurance. And then also making sure that one, we give them the full threat if they were to comply, or if they didn’t comply. And we also provided them an option to coordinate law enforcement in full with our resources and contact. So long story short, we were a trusted provider to them providing variety of different options that we effectively could negotiate, get the coins, uploaded into the Bitcoin wallet, encrypt the information, verify that the data was actually returned, and they normally do it in a phase sequence, you do a payment first, and then they’ll give you kind of 30% of your data back. We verify the data, and then we continue to execute the ransomware transaction in terms of the negotiation but that’s So stories of some very in depth things that our firm specializes in. So we’re crisis management partner in most cases, but we can also provide the traditional everyday normal things that due diligence compliance and investigations. Wow.

Will Bachman 20:18
I mean, I’d love to hear two or three more examples. Those are both, like really fascinating. Things to be working on. Give me some other examples.

Adam Roosevelt 20:28
Yeah, sure, I’ll give you some failed, projects that, based on what we were asked to do, we decided not to do it. Once we got a name in this special space, your name kind of gets around pretty quick. And people think that you can perform things that are impossible. Okay, we had a situation, somewhere around the world in the globe, that required an extraction. So because of our military background, because of our global reach, because we are the folks that you can read about in terms of x NSA Special Forces, there are people out there who believe that we’ll be able to execute that I think it was possible. But the problem is the risk exposure. The problem is the compliance, the problem is the the entire legal regulatory element that we still have to abide by. So they had required an extraction of a very high level individual who was unfortunately, in a government position. And essentially, we’ll hear it was a very delicate situation. We, unfortunately, were not able to execute, it was within our wheelhouse, but we had to make sure we didn’t put our company at risk. That’s another example. Now, I’ll give you one last one that might be interesting to you. And it was in the bankings, slash venture capital space. And there are corporations out there who are working with individuals across the globe. And they’re so interested in the due diligence aspects, because some people put together a very beautiful portfolio online and on paper. And now with this pandemic, it’s very difficult to tell if it’s telling the truth. So the VC organization reached out to their law firm yet again, law firm reached out to us to conduct due diligence on their entire C suite, to effectively make sure that everything checked out, and that, including specific areas will. So it’s interesting, some things are different in Switzerland, as they would probably be in Africa, we had to carry out a due diligence check on multiple locations. So and then compile that report, and effectively provide that to the clients. And one last story, well, I think you’d like this, our team was responsible for collecting information for the intelligence, the intelligence equities for election security. So they asked us to do a report on one of the states in the United States, and we were able to provide an 80 page report on all the threats that impacted the election security. So it’s not just the cybersecurity stuff, it’s not just the compliance is the that and the investigations and having the full ability to carry out, you know, any request on demand that your client will come to you for and that’s what we’ve provided. That’s who we are. And we pretty much can deliver up to any solution within that space, provided the compliance equities will allow us to do it.

Will Bachman 23:37
Talk to me about how you go about doing this range of due diligence on like the set of individuals for that for that VC firm, what, what are the types of questions they’re asking to look into? And, and to the extent that you can tell me a bit about how you go about doing that?

Adam Roosevelt 23:52
Sure. So you know what’s interesting? And I’ve got a few different ways to answer this. A lot of the general counsel’s or the attorneys that are going to be asking the questions to us, they want to know the process, Hey, how are you going to execute this? How is it going to be done? And essentially, we have our technical experts on the call. And this is what we will tell you, we have a set of technology that I think everyone is used to hearing the technology like LexisNexis, and all these other different things we have, we have the technology that not just uses LexisNexis, but we have like four or five proprietary technologies so that we d duplicate and make sure that the information is accurate. We also look at open source collection. So for example, we’ve had people with names that were Spanish and you’ve got to D duplicate the last name because the individual is using different names has two different IDs. So we go through a series of different checks within our checklist to collect open source information, we look at data repositories which public records, we do have force, we have everything available. You know, we’re checking OFAC list listings, we’re looking at, you know, the local ID numbers. It just depends on the case, it depends on the request. But it can go from being very in depth, or just being a very light check. And we’ve got the technology systems, as well as the service providers in house who are x investigators from the the agency who specialize in that tradecraft. And we can do it pretty quick. In any country, some countries could take you two to three weeks, depending on what’s happening in a pandemic, you know, because of the the various issues, there may be curfews in place, but we’ve got resources deployed everywhere to do the double check to make sure whatever we give the clients is accurate. And that’s mostly important.

Will Bachman 25:50
How do you go about the first example that you mentioned, of doing the asset recovery, that seems to go well beyond you know, kind of cybersecurity type things have seems that you need the participation and you know, of different banks to be willing to share information. Talk to me about how you’d go about getting that, you know, financial picture for someone.

Adam Roosevelt 26:15
You know, we had a, we had a case, that goes back to 2008. And effectively, we had to have the authorization and one of the ways you can get authorization essentially could be through a law firm, you know, and what we did was, we were assigned the E discovery element, for example. So we were able to use our tools within that scope of compliance to trace out likely activity in terms of where the money might be verifying sources, consolidate that information. And effectively putting that into a report for the legal team is really very careful and selective. In my words, obviously, because it’s very difficult to explain it when you’re having to redact the information. But we were given the authority to do an investigation that allowed us to compile the information around it. Now, the assets search for the net two parts, the asset search piece is important. So a lot of things maybe people don’t know about, or assets can be hidden in vehicles, art, they could be hidden in boats, it could be hidden property purchases, and then it can also be hidden through again, the spouses and the children, we’ve seen a lot of cases like this, where the individual is hiding it with his spouse or his loved one who just happens to be his daughter. And then we traced those assets out using public records. So some of a lot of this because you got to be able to defend it in the court of law. And that’s the hard part, you can’t do anything malicious, you can’t do anything that would be a compromise to integrity, because you can’t use that in litigation. So that’s the search piece. And then the recovery piece is, you know, you could do that through a settlement. Because obviously, the information is going to be presented. And the case that that we were supporting it actually is interesting, because we uncovered embezzlement up to I think, $300 million dollars. And then the settlement that ended somewhere around $80 million, once it went through the whole legal matter was concluded. So very interesting time, but we have some very interesting use cases. And I can share that with you when we get an NDA Of course, but I’ll give you the use case example of that as well.

Will Bachman 28:39
Now, so you’ve got the cybersecurity background. It sounds like your team has a mix of different skills. Talk to me about some of the other types of profiles of team members on in your firm.

Adam Roosevelt 28:52
Okay, sure. So, we got some interesting folks. So well, we got Steve Kohler and, and Kohler is an interesting individual, just kind of in plain talk. He’s that corporate executive who really knows how to see the bigger picture and specializes in communicating that to C suite executives who may not understand cyber, who may not understand investigations and corporate compliance, you know, he has been tapped by the former governor, to effectively be that, that person that can actually articulate that at a very senior level, and I think his communication capability, given his background is one of his most strongest capabilities. amongst his entire experience. Richard Kendall is law enforcement. Richard knows every single person in terms of the attorneys Department of Justice. He’s got a very large portfolio and has been on the front lines with DEA FBI Secret Service, the marshals and he really commands the authority within the legal space, and as well as the law enforcement space, you know, specializing in risk mitigation and threatening Estimates investigations and crisis communications show he’s a very big asset to our firm, and is a great beard. You know, we need to have those I think around us as a young firm so that we can have people in the room who have seniority in the space, but also had the authority in this space. I’ll talk about john Rutledge you know, john Rutledge is what we call our Rothschilds brother. And I’ll tell you, because he’s been involved in the investment in finance for so long, and now he’s the chief investment strategist at Sapa non stop not is the largest investment fund in Saudi Arabia. It’s massive. But his experience going back to the Reagan era, he was actually the architect of the reagan economic plan in 1980. You know, so he did a lot of work in and out of the Reagan era, the bush white house or tax policy. And now he’s globally known as one of these very important individuals who’s contributing in the space, you know, on the financial services side, your engine negative, very connected, his father actually worked for back in South Africa, for I don’t remember the major we’ll, I’ll get back to it. But he’s very connected in the Middle East, has been doing this for a while his family as well known as South Africa, and then go back a century essentially. And his skills is he’s a commodity trader, he really understands the commodities, he understands everything in terms of how to move a commodity financing commodity, he’s been involved with this a while we family, very powerful, like the founders of Oman, I mean, these are the type of individuals that you know, you have in your cabinet, really gives you in depth insight into the world. And then I’ll talk about James keys, you know, James, his background is phenomenal, you know, CEO, blockbuster and 711. I think we all went to the movie once or twice in our time. And his experiences standing up, one of the most successful chains in the country is amazing in itself, think of the lessons learned is the advice that he could give you if you really wanted to build a conglomerate. And we’ve been able to partner with James on that. And then to come into my last three people. Gregory carpenter, you know, he’s an individual who you can call for anything in terms of cyber crisis, he understands everything in terms of the cyber element in terms of how to build it, break it, disrupt it, destroyed network, former military officer really gets it, you know, worked with the NSA is very capable, and has done a lot of work on the academic side. And then last two here, Joe battiato, Joseph, big, a big name. You know, he used to work for Morgan Stanley and company had a lot of senior positions. There, we was strategic in the merger acquisition for some of the major m&a, you know, the IPO advice, growth instruments that are required for, you know, these major efforts that are happening throughout the country. And, you know, those are very important elements to have in our firm, whereby the clients who just need to hear the experts speak to it to make them feel at home. And then lastly, I Brennan, he, he and I actually work a lot together, outside of just the conversation here, but really in the political space. And we have done a lot of work, you know, in the economic conversation, and he used to work in support, you know, God bless restaurants. So john mccain, and he was working as his senior economic advisor, or senior economists, while john mccain was still with us. So that’s that’s kind of the pandal. Let me go back to the range. And one last time it was the the president of South Africa, then everybody knows, are you familiar?

Will Bachman 34:06
I forget his name myself.

Adam Roosevelt 34:09
Yeah. Mandela. Oh, right, Reverend. Oh, yeah, of course, Nelson Mandela. So I’ll leave it. Lastly, to say that his family served Nelson Mandela. And he served Nelson Mandela, and was asked to go to Dubai, and represent Nelson Mandela there. So his family that they do family is a household name in South Africa. They were pushed out, but they’re still very well known, and very powerful. So those are the things that we saw as key elements for our success long term. And as again, as an independent contractor, I had to be dynamic. I had to think outside of the box, and I built this coalition of knights and I think these are the people that will bring me into this space today, as well as in the future.

Will Bachman 34:55
Yeah, that’s amazing. And what about some of the employees of your firm talk to me about the kind have talent that you’ve recruited,

Adam Roosevelt 35:03
you know, traditional experts, you know, to carry out a lot of the in house function. So from a marketing perspective, we got some really good people on our team that are doing marketing for us. And that’s the boring stuff, I think, for the folks who who understand or don’t understand, but it’s making sure our marketing documentation is great. I’ve got this designer, who Sonali, she’s a fantastic designer and marketing genius, who really understands how to put together the infographics and pull the information together, get us a one pager, and push it out to market pretty quick. I’ve got, you know, your traditional CFO, who’s 20 years in the game, who really understands, you know, the tax elements and all the changes that are going on in the laws that are impacting the country and how to make sure we recover costs, from all the money spread. We’ve got our Vice President, who’s former military as well and served 15 years and has a tremendous background in like, you know, for structures and making sure we are aligned in our visions, and seeing the alignment with the US military for our service sets. And making sure we’ve deployed in national security solutions. We’ve got a political consultant internal to the team as well, just so that we have an understanding of the landscape of each country, and you know, how the things work in terms of courtesy, and communications and protocols. So that kind of covers some of the things that we do. But traditionally, like every other organization, we have someone in place to support executing their traditional roles, or whether it be marketing, whether it be accounting, human resources, crisis management, and then obviously, you got to have your lawyer, which we’ve got three.

Will Bachman 36:50
This is amazing. What a story. So Adam, tell me and share with listeners. Where can people go online to find out more about your work?

Adam Roosevelt 37:00
Sure. So online, we’ve got a presence. Our website is www dot A Ri in tn TL, CO, in Su, LTI, and G. So that’s a ri MTL, the word consulting Comm. It will be there all of our information is there. On the social media world, we’ve got quite a bit of a footprint on LinkedIn, you can just type in AR international consulting will come up, you can type in my name. On Instagram, you simply just type in Adam Roosevelt official, you’ll find my information there. And I think we’re up to about 16,000 followers on on LinkedIn. And I think we’re somewhere between 13,000 followers on Instagram. So we’re just continuing to connect with the market. Be a thought leader, but those are the locations where you can find me and also everybody’s on Facebook. So you just type in AI, national consulting, and you’ll find the sphere as well.

Will Bachman 37:57
Fantastic. Well, we will include those links in the show notes. Adam, this is fascinating hearing about your practice. Congratulations on building a growing firm. It’s really quite a story. Thanks so much for joining today.

Adam Roosevelt 38:11
Thank you. I appreciate it.

Related Episodes


Automating Tax Accounting for Solopreneurs

Ran Harpaz


Integrating AI into a 100-year-old Media Business

Salah Zalatimo


Author of Second Act, on The Secrets of Late Bloomers

Henry Oliver


Third Party Risk Management and Cyber Security

Craig Callé