Podcasts > Shawn Ryan Show > #254 Brian Harpole - Groundbreaking Evidence From Charlie Kirk’s Head of Security

#254 Brian Harpole - Groundbreaking Evidence From Charlie Kirk’s Head of Security

By Shawn Ryan Show

In this Shawn Ryan Show episode, Brian Harpole, founder of Integrity Security, details his company's security operations for Charlie Kirk, including their rigorous personnel selection process and multi-layered protection strategies. He discusses the challenges his team faced during an event at Utah Valley University, where promised local law enforcement support did not materialize.

Harpole addresses the investigation of Kirk's assassination, including forensic evidence and the official autopsy findings. He responds to various theories about the shooter's identity and motives, while highlighting how public distrust in institutions has affected the aftermath of the event. The discussion examines the impact of limited transparency on the spread of unsubstantiated narratives and the subsequent harassment of security personnel.

#254 Brian Harpole - Groundbreaking Evidence From Charlie Kirk’s Head of Security

This is a preview of the Shortform summary of the Nov 17, 2025 episode of the Shawn Ryan Show

Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.

#254 Brian Harpole - Groundbreaking Evidence From Charlie Kirk’s Head of Security

1-Page Summary

Security Detail For Charlie Kirk

Brian Harpole, founder of Integrity Security, provides insights into the expert security team protecting Charlie Kirk since 2018. The company employs a rigorous selection process, requiring candidate sponsorship and intensive training in various security disciplines. Harpole emphasizes that his team prioritizes moral character and soft skills during the hiring process, complemented by ongoing tactical training.

At events, Integrity implements a multi-layered security approach using concentric circles of protection, including physical barriers and controlled checkpoints. However, during an event at Utah Valley University, the team faced significant challenges. Harpole reports that the venue's amphitheater layout presented security vulnerabilities, and promised support from local law enforcement, including drone surveillance and rooftop access control, failed to materialize.

Charlie Kirk's Assassination: Investigation, Theories, and Evidence

Following Kirk's assassination, numerous unsubstantiated theories emerged regarding the shooter's identity and motives. Harpole addresses and dismisses various conspiracy theories, including allegations of foreign intelligence involvement and internal betrayals. While Tyler Robinson was apprehended as the shooter, questions about potential accomplices and motivations remain unanswered.

Regarding forensic evidence, Harpole confirms that Kirk died from a gunshot wound to the neck, which caused catastrophic damage to his vertebra and carotid artery. He personally attempted to stop the bleeding at the scene. Harpole also debunks theories about explosive devices or "palm guns," noting the absence of any supporting evidence.

Aftermath of Assassination: Autopsy, Crime Scene, Public Response

The investigation included a swift autopsy, which Harpole encourages skeptics to verify through FOIA requests to the Utah County medical examiner's office. However, public distrust in institutions has led to widespread harassment of the security team. Harpole reports that team members have been doxxed, with their personal information exposed online, and individuals like Gary from Paramount Tactical have faced criticism for contradicting conspiracy narratives.

Harpole notes that greater transparency from authorities could have prevented the spread of unfounded accusations and protected individuals from harassment. Shawn Ryan emphasizes that institutional transparency is crucial for rebuilding public trust in the aftermath of such events.

1-Page Summary

Additional Materials

Clarifications

  • Charlie Kirk is a prominent conservative political activist and founder of the organization Turning Point USA. He is known for his outspoken views and influence among young conservatives in the United States. Due to his high public profile and controversial stances, he often requires professional security to protect against potential threats. His security detail helps ensure his safety at public events and appearances.
  • Integrity Security is a private security firm specializing in personal protection and event security. It provides trained personnel to safeguard high-profile individuals like Charlie Kirk. The company uses advanced security protocols and coordination with local authorities. Its role is critical in preventing threats and managing risks during public appearances.
  • The Utah Valley University event was a high-profile public appearance by Charlie Kirk, attracting large crowds and requiring heightened security. Its amphitheater layout made it difficult to control access points and monitor attendees effectively. The failure of promised local law enforcement support increased the security team's vulnerability. This event highlighted critical weaknesses in the protective measures before the assassination.
  • "Concentric circles of protection" is a security strategy that creates multiple layers of defense around a person or location. Each circle represents a zone with increasing security measures as you move closer to the protected individual. This approach helps detect and stop threats early, before they reach the inner circle. It often involves physical barriers, personnel, and surveillance at each layer.
  • Charlie Kirk is a political activist and commentator known for founding the conservative group Turning Point USA. Assassination refers to the targeted killing of a prominent figure, often for political reasons. Such events typically trigger extensive investigations and public scrutiny. The context includes heightened security concerns and potential political ramifications.
  • Tyler Robinson is identified as the individual apprehended for the assassination of Charlie Kirk. His role is that of the shooter responsible for the fatal attack. Details about his background or motives have not been fully disclosed. Investigations continue into whether he had accomplices or specific reasons for the act.
  • "Palm guns" are small, concealable firearms designed to fit in the palm of a hand, often resembling everyday objects. They are sometimes rumored in conspiracy theories as secret weapons used in assassinations. Their mention here addresses and refutes such unfounded claims related to Charlie Kirk's assassination. No evidence was found supporting the use of such a device in this case.
  • Gary from Paramount Tactical is likely a security professional or consultant involved in the response or investigation related to Charlie Kirk's assassination. His role included providing expert opinions or information that contradicted popular conspiracy theories. This opposition to unfounded narratives led to criticism and harassment from conspiracy supporters. Paramount Tactical is presumably a security or tactical services company connected to the event or investigation.
  • A FOIA request is a formal appeal to access government-held information, promoting transparency. The Utah County medical examiner's office maintains records like autopsy reports, which can be requested through FOIA. This process allows the public to independently verify official findings and counter misinformation. FOIA laws vary by state, so specific procedures and exemptions apply.
  • Doxxing is the act of publicly revealing private personal information about someone without their consent. This can include addresses, phone numbers, or workplace details. It often leads to harassment, threats, and emotional distress for the targeted individuals. For security team members, doxxing compromises their safety and ability to perform their duties effectively.
  • Local law enforcement often provides additional security resources at high-risk events to enhance safety. Drone surveillance offers aerial views to monitor crowds and detect threats early. Rooftop access control helps prevent unauthorized entry from elevated positions, reducing attack risks. These measures create layered defenses, making it harder for attackers to exploit vulnerabilities.

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#254 Brian Harpole - Groundbreaking Evidence From Charlie Kirk’s Head of Security

Security Detail For Charlie Kirk

Brian Harpole, founder of Integrity, outlines the intricacies of the expert security team assigned to protect Charlie Kirk, emphasizing their rigorous selection process, ongoing training, and strategic multi-layered security measures at events. Despite comprehensive planning, they encounter limitations related to venue support and cooperation from local law enforcement.

Integrity Security: Expert Team Securing Charlie Kirk

Rigorous Selection and Ongoing Training

Integrity Security, led by Brian Harpole, has been working to ensure the safety of Charlie Kirk since 2018. The company's name, Integrity, implies a commitment to principles and standards within its operations. Harpole, with his law enforcement background and the mentorship he's received, oversees a unique and selective hiring process for his team, which has gained positive recognition for its quality personnel. To join Integrity, candidates must be sponsored by current team members and go through an intensive training regime, which can vary in duration. At the training facility, they hone skills in defensive tactics, emergency medicine, personal security detail tactics, and firearms, with weekly sessions to maintain proficiency.

The team takes a democratic approach to hiring, ultimately voting on each candidate's acceptance following a vetting process that assesses moral character and soft skills. Harpole insists on the importance of these traits, even prioritizing them over hard skills, which he believes can be taught.

Multi-Layered Security: Perimeter, Access Control, Plainclothes, Specialized Response

Detailing their meticulous approach to creating a safe perimeter around Charlie Kirk during events, Integrity employs the concentric circle of security theory to build layers of protection. They use non-permeable barriers, like caution tape and strategically placed vehicles alongside physical hard bike racks, to create controlled zones. Access to these zones is heavily regulated through checkpoints and on-site officers, including an unexpected additional police officer. With reinforcement from environmental design principles like CPTED, their setup ensures a strong visual and physical deterrent against potential threats.

Security Alert, Limited by Venue Support

Security Concerns With Venue Layout Not Implemented

Despite these advanced strategies, Integrity confronts limitations, as experienced during an event at Utah Valley University (UVU). The chosen venue was tactically disadvantageous, presenting a 180-degree vulnerability in an amphitheater layout. Harpole and his team had to work within these constraints, which included gaps in barricades that they would not have preferred, but accepted at Charlie Kirk's preference.

Harpole emphasizes that they're aware of their responsibilities and the limits of their statutory authority, which influences their tactical decisions, such as refraining from the utilization of snipers. They still identified and took precautionary measures against potential issues, like the giant architectural rocks that could be used as weapons. This required the establishment of a tempor ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Security Detail For Charlie Kirk

Additional Materials

Clarifications

  • The "concentric circle of security theory" is a protective strategy that arranges security layers in rings around a person or asset. Each circle represents a different level of access control and threat detection, with the innermost circle being the closest and most secure. This method helps identify and neutralize threats before they reach the protected individual. It is widely used in executive protection and event security planning.
  • Crime Prevention Through Environmental Design (CPTED) is a strategy that uses the physical environment to reduce crime opportunities. It involves designing spaces to increase natural surveillance, control access, and promote a sense of ownership. Examples include proper lighting, clear sightlines, and well-maintained landscaping. The goal is to deter criminal behavior by making it harder to commit crimes unnoticed.
  • Private security guards protect specific clients or properties but do not have the full legal powers of police officers. They cannot make arrests beyond a citizen's arrest or enforce laws outside their contract scope. Local law enforcement has broader authority, including arrest powers, use of force, and access to public resources. Private security must often coordinate with police for actions requiring legal enforcement or public safety measures.
  • Snipers are considered in security for their ability to neutralize threats from a distance. However, their use is often restricted due to legal, ethical, and safety concerns, especially in public events. Deploying snipers requires strict coordination with law enforcement and clear rules of engagement to avoid collateral damage. In many cases, security teams opt for less lethal, more controlled measures to minimize risk to bystanders.
  • Temporary trespass zones are designated areas where unauthorized individuals are legally prohibited from entering during an event. They help prevent potential threats by restricting access to vulnerable or strategic locations. Establishing these zones allows security teams to control and monitor critical spaces more effectively. Enforcement often requires cooperation from local law enforcement to ensure compliance.
  • Mutual aid agreements are formal arrangements where private security and local police agree to support each other during events or emergencies. These agreements outline the scope of assistance, resource sharing, and communication protocols. They help coordinate efforts to enhance safety beyond what either party could manage alone. Such agreements are legally binding and clarify responsibilities to avoid conflicts.
  • Airspace restrictions limit where and when drones can fly, often to protect privacy, safety, or sensitive locations. These rules are set by aviation authorities and local governments and can prohibit drone flights over crowds or near airports. Violating these restrictions can lead to legal penalties and safety risks. Therefore, drone use at events requires prior authorization and coordination with relevant authorities.
  • An amphitheater layout typically has seating arranged in a semi-circle or horseshoe shape, exposing the stage area to open space on one side. "180-degree vulnerability" means the security team cannot fully enclose the protected individual from threats coming from the open side. This creates blind spots and limits the ability to establish a secure perimeter. Such layouts require additional vigilance and creative security measures to mitigate exposure.
  • Candidate sponsorship ensures new hires are vouched for by trusted team members, promoting trust and cultural fit. Democratic voting allows the existing team to collectively approve candidates, fostering accountability and cohesion. This process helps mai ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#254 Brian Harpole - Groundbreaking Evidence From Charlie Kirk’s Head of Security

Charlie Kirk's Assassination: Investigation, Theories, and Evidence

The assassination of Charlie Kirk has sparked widespread speculation and allegations lacking in evidence. Brian Harpole, who led the security detail at the time of the incident, and Shawn Ryan have discussed various aspects of the case, ranging from the shooter's identity and potential motives to the dismissal of unfounded conspiracy theories.

Theories and Speculation About Shooter's Identity and Motives Lacked Evidence

Many people sensationalized Charlie Kirk's assassination, leading to a proliferation of baseless theories. Shawn Ryan mentions allegations that pointed to potential right-wing extremists, left-wing extremists, and even international actors as the shooter.

Unfounded Allegations of Foreign, Extremist, and Security Team Involvement

Brian Harpole addressed allegations that linked his security team to Mossad or other foreign intelligence, which he vehemently denied. He affirmed that his team comprises Americans who believe in their country's system. Harpole refuted the connection between his team and any extreme political parties.

Harpole dismissed the unfounded theories about Israeli hitmen threatening Charlie, asserting that they had never received credible intelligence from the FBI or Secret Service regarding such allegations. He also clarified that there were no internal leaks or betrayals within TPUSA or his security team that could have facilitated the attack.

Shooter Tyler Robinson Apprehended; Questions Remain About Accomplices, Motivations

Despite Tyler Robinson's capture as the shooter, unanswered questions persist about the potential involvement of accomplices and his motives. Comparing Robinson's case to that of Timothy McVeigh, Harpole expressed curiosity about the possibility of Robinson being a "patsy."

Forensic Evidence Contradicts Online Conspiracy Theories

An array of conspiracy theories has emerged online that lacks basis in forensic evidence.

Autopsy Confirms Charlie Kirk Died From Gunshot Wound to Neck

Brian Harpole confirmed the cause of Charlie Kirk's death was a gunshot wound to the neck. Harpole personally attempted to stop the bleeding by diving on Kirk and shoving his hand into the neck wound. The bullet caused catastrophic damage, shattering a vertebra and significantly impacting the carotid artery.

No Evidence of Explosive or "Palm Gun" Despite Claims

Harpole debunked the conspiracy theory of a "palm gun" or an exploding microphone ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Charlie Kirk's Assassination: Investigation, Theories, and Evidence

Additional Materials

Actionables

  • You can enhance your critical thinking skills by practicing the evaluation of online information. Start by finding a controversial topic, then look for various sources reporting on it. Compare the evidence presented, check the credibility of the sources, and make a habit of questioning the validity of sensational claims. This will help you discern fact from fiction in situations similar to the conspiracy theories mentioned.
  • Improve your emergency response knowledge by taking a basic first aid course that includes training on how to manage severe bleeding. While you may not be in a security detail like Brian Harpole, knowing how to apply pressure to a wound or use a tourniquet can be life-saving in any emergency situation.
  • Foster trust in your community by creati ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#254 Brian Harpole - Groundbreaking Evidence From Charlie Kirk’s Head of Security

Aftermath of Assassination: Autopsy, Crime Scene, Public Response

The aftermath of a high-profile assassination has led to a well-timed autopsy and investigation colored by public skepticism, resulting in a rise of distrust in institutions and the spread of conspiracy theories.

Autopsy and Investigation Conducted Timely Despite Public Skepticism

Medical Examiner Confirmed Autopsy Findings Shared With Authorities

Harpole stressed the importance of getting the autopsy done quickly to curtail the spread of conspiracy theories. An autopsy was performed, and he encourages people to look at the report once it is made available. For those who doubt the autopsy took place, he suggests filing a Freedom of Information Act (FOIA) request with the Utah County medical examiner's office for verification. During the ride following the shooting, Harpole recalls that there was no exit wound from the bullet, which he checked for and later had to open the entry wound to pack, noting that exit wounds are typically larger.

Crime Scene Secured; Paving Decision Questioned

The chief of police instructed the security team to hold the crime scene and aid in the search for additional clues, furthering the investigation efforts.

Assassination Sparks Distrust In Institutions and Spreads Conspiracy Theories

Security Team Harassed, Doxxed, and Retaliated Against Over Unfounded Online Claims

The security team has faced substantial harassment and duress following the assassination, brought on by unfounded online claims. Brian and his team have been criticized, and Harpole used the podcast appearance as a chance for the security team to represent themselves amidst these events. He outright dismisses allegations against the team as ridiculous and defends the use of hand signals in security as a necessary part of non-verbal communication. The spread of lies online caused individuals like Gary from Paramount Tactical to be wrongly chastised for providing professional opinions that contradicted conspiracy narratives.

Authorities Need Transparency and Accountability Due to Distrust From Lack of Information

The lack of transparency from authorities has led to doxxing and h ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Aftermath of Assassination: Autopsy, Crime Scene, Public Response

Additional Materials

Counterarguments

  • The promptness of the autopsy, while intended to curb conspiracy theories, may not be sufficient on its own to prevent public skepticism without full transparency and open communication about the findings.
  • Even if the Medical Examiner shared autopsy findings with authorities, the public may still distrust the process if there is a delay or perceived lack of transparency in sharing those findings with the public.
  • Filing a FOIA request may not be a viable option for everyone due to the complexity of the process or delays in response, which could contribute to ongoing skepticism.
  • The observation of no exit wound is a factual detail, but it may not address all public concerns about the nature of the assassination or the possibility of additional evidence not being disclosed.
  • Securing the crime scene is standard procedure, but the effectiveness of the investigation could be questioned if the public perceives that not all potential evidence has been considered or reported.
  • While harassment and doxxing of the security team are condemnable, the public's distrust may stem from a broader context of institutional mistrust, which requires more systemic solutions than simply defending against specific allegations.
  • The use of hand signals in security is a standard practice, but without context, such actions can be misinterpreted by the public; thus, education on security protocols may be necessary to alleviate misunderstandings.
  • Professional opinions that contradict conspiracy theories can be valuable, but they must be communicated effectively to the public to counteract the spread of misinformation.
  • Transparency is crucial, but it must be balanced with the integrity of the investigation and the protection of sensitive information that could compromise the case if released prematurely.
  • The early release of information could prevent harm, but it must be accurate ...

Actionables

  • You can foster critical thinking by starting a journal where you document and analyze major news events, focusing on the evidence presented and different perspectives offered. This practice will help you discern facts from speculation and understand the importance of transparency and evidence in forming opinions. For example, when you hear about a significant event, write down the key points reported, list the sources, and note any discrepancies or gaps in the information provided.
  • Enhance your digital literacy by taking an online course on data privacy and cybersecurity to protect yourself from doxxing and online harassment. By learning how to secure your personal information, you'll be better equipped to safeguard your privacy and help others do the same. Look for courses that cover topics like strong password creation, two-factor authentication, and recognizing phishing attempts.
  • Volunteer with a local community organization that ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free

Create Summaries for anything on the web

Download the Shortform Chrome extension for your browser

Shortform Extension CTA