Shawn Ryan Show

#254 Brian Harpole - Groundbreaking Evidence From Charlie Kirk’s Head of Security

November 17, 2025

Key Takeaways Copied to clipboard!

  • Brian Harpole, head of security for Charlie Kirk, appeared on The Shawn Ryan Show to address sensationalized and untrue narratives surrounding the assassination of Charlie Kirk on September 10th. 
  • Harpole detailed the rigorous, integrity-focused vetting and training process for his company, Integrity Security Solutions, emphasizing team cohesion and character over past achievements. 
  • Harpole revealed that the security detail was significantly increased to 12 men for the event, and he had expressed specific concerns about rooftop access to the UVU Police Chief, who assured him the area would be covered, a promise that was allegedly not kept. 
  • The security detail employed a multi-layered defense strategy utilizing presidential-style barricades, specialized personnel (including a jiu-jitsu expert) at key gaps, and plainclothes operatives within the crowd to monitor for pre-incident indicators of violence. 
  • The immediate response to the shooting was exceptionally fast, with the security team applying direct pressure to the carotid artery wound within five seconds and initiating an evacuation (Exfil) within 15-16 seconds, demonstrating extensive, rehearsed training. 
  • Conspiracy theories regarding the cause of death (e.g., an exploding microphone) are refuted by the on-scene medical assessment, which found no exit wound, no charring, and no blast evidence, confirming the injury was a direct gunshot wound to the neck. 
  • The lack of transparency from institutions regarding evidence, such as the security footage from the incident, directly fuels public distrust and leads to harmful online speculation against victims and their families. 
  • The guest, Brian Harpole, strongly advocates for transparency, arguing that releasing factual information, even if it risks tainting a jury pool, is necessary to counter damaging conspiracy theories and support those affected. 
  • There are significant unanswered questions regarding the immediate aftermath of the shooting, including the rapid destruction of the crime scene and the actions of non-security personnel (like the AV team member) present at the event. 

Segments

Guest Introduction and Motivation
Copied to clipboard!
(00:00:47)
  • Key Takeaway: Brian Harpole is appearing on The Shawn Ryan Show to counter sensationalized and untrue narratives surrounding Charlie Kirk’s assassination.
  • Summary: Brian Harpole, head of security for Charlie Kirk, confirmed he was present when Kirk was assassinated two months prior. Harpole felt compelled to speak out because misinformation was making it impossible to find the truth and was potentially harming his team’s careers. He confirmed that nothing discussed is off-limits except for matters covered by an NDA related to a specific incident.
Harpole’s Professional Background
Copied to clipboard!
(00:03:53)
  • Key Takeaway: Harpole is a highly decorated former Texas police officer who transitioned to private security, specializing in executive protection globally.
  • Summary: Harpole served 14 years in Texas law enforcement, specializing in identifying ‘bad guys’ through physiological movements. He transitioned to private security in 2008, later founding Integrity Security Solutions, which operates across five continents. His experience includes high-risk work like surveillance inside cartel houses in Juarez, Mexico, documenting child trafficking operations.
Integrity Security Team Vetting
Copied to clipboard!
(00:08:44)
  • Key Takeaway: Integrity Security Solutions requires potential hires to be sponsored, undergo extensive training, and receive a unanimous ’thumbs up’ from the existing team.
  • Summary: New hires must be sponsored by an existing team member and train with the group every Wednesday, covering tactics, medicine, and firearms for an indeterminate period. The team collectively votes on acceptance, prioritizing soft skills like teamwork and selflessness over pre-existing hard skills. The final step for full integration is authorization by the team to receive the company tattoo, signifying brotherhood.
Ongoing Training Requirements
Copied to clipboard!
(00:26:14)
  • Key Takeaway: Integrity mandates 40 hours of annual training, with most members exceeding 200 hours, focusing on advanced, applicable skills.
  • Summary: The company policy requires 40 hours of training annually, split between internal and external instruction, though most members log around 200 hours. This training is advanced and directly applicable to current operational needs, unlike passive training seen in previous roles. Failure to maintain these hours can result in being furloughed until compliance is met.
Addressing Foreign Intelligence Allegations
Copied to clipboard!
(00:35:34)
  • Key Takeaway: Harpole vehemently denied any ties between his team and foreign intelligence agencies, specifically Mossad, asserting they are strictly American.
  • Summary: When asked directly about ties to Mossad, Harpole stated unequivocally that none of his team members have any such affiliations, noting he has never even visited Israel. He emphasized that his team members are deeply committed to their families and each other, making the idea of planning assassinations against their client unthinkable. He confirmed that the team’s focus is on protecting the client and upholding their oaths to each other.
Pre-Event Threat Assessment
Copied to clipboard!
(00:38:34)
  • Key Takeaway: The security advance began on August 24th, utilizing a decentralized command app to share intelligence in real-time with all team members.
  • Summary: The intelligence gathering and planning phase started two weeks prior to the event, using an app to create a decentralized command model where any member could make decisions for the client’s benefit. Harpole confirmed that Charlie Kirk never expressed security concerns regarding Israel or foreign nations to the security detail, despite media reports suggesting otherwise. The team prioritized probable threats (domestic opposition) over possibilities without tangible intelligence.
Venue Security Failures
Copied to clipboard!
(00:47:28)
  • Key Takeaway: Harpole detailed specific security deficiencies at the UVU venue, including the open-air nature of the event and the failure of the UVU Police Chief to act on rooftop access warnings.
  • Summary: Charlie Kirk preferred the open venue setup to encourage conversation, despite security concerns about the lack of ticketing and control. Harpole’s team physically built their own security model, including using vehicles as barricades against vehicle-borne threats. Harpole revealed correspondence with UVU Police Chief Long regarding student access to a roof near the speaking area, to which Long responded, ‘I got you covered,’ but no follow-through or assistance was provided by campus police.
Security Manpower and Immediate Response
Copied to clipboard!
(01:01:18)
  • Key Takeaway: The security detail was intentionally increased to 12 men, and their immediate response to the shooting was executed flawlessly according to protocol.
  • Summary: Harpole increased manpower from the usual 8-9 to 12 due to the general world situation, which proved necessary for covering elevated positions and securing areas where rocks could be thrown. The team successfully established a temporary criminal trespass zone on a walkway above the tent, requiring local PD assistance for enforcement. Within five seconds of the shooting, Harpole was on top of Kirk, demonstrating the team’s practiced, coordinated response.
Layered Security Barricade Setup
Copied to clipboard!
(01:13:43)
  • Key Takeaway: Security utilized dual rows of presidential-style barricades creating a vetted alley for controlled access.
  • Summary: The outer layer of barricades established a clear boundary, followed by a secondary row with a gap for conversation. Two highly capable security personnel, one with incredible physical capabilities and another a world-renowned jiu-jitsu professor, guarded this gap to prevent breaches. This setup created a secondary alley for vetting individuals, checking for prohibited items, and controlling access.
Crowd Surveillance and Intel Gathering
Copied to clipboard!
(01:16:10)
  • Key Takeaway: Plainclothes security professionals actively scanned the crowd for pre-incident indicators like ‘prey gaze’ and lack of social contact.
  • Summary: Security personnel worked in plain clothes within the crowd, specifically looking for military-age males exhibiting signs of focused intent, such as hard prey gaze or excessive blinking near the principal. These seasoned operatives were tasked with proactive intelligence gathering rather than waiting for incidents to occur. They reported real-time intel on potential threats, including individuals creating distractions like chanting or pushing signs.
Security Zone Overlap and Focus
Copied to clipboard!
(01:20:00)
  • Key Takeaway: The venue was broken into overlapping zones of responsibility where security focused on a limited area to maximize situational awareness.
  • Summary: The entire venue was divided into zones with overlapping areas of responsibility for scanning and security coverage. Security professionals were trained to ’look at less so you can see more’ by focusing intensely within their assigned zone rather than scanning broadly. The command and control role involved monitoring communications and filling gaps left by personnel responding to immediate threats.
Timeline Deviation and Arrival
Copied to clipboard!
(01:24:14)
  • Key Takeaway: A planned meet-and-greet was canceled due to a timeline shift, requiring the security team to adjust immediately to the new route to the tent.
  • Summary: The scheduled meet-and-greet in a hard room was called off, rerouting Charlie directly to the tent after a quick restroom break. The team adapted to this change, which was noted as not abnormal but required immediate plan adjustment. The principal expressed optimism before the event, stating, ‘It’s going to be a good day.’
Evacuation Route Planning
Copied to clipboard!
(01:26:02)
  • Key Takeaway: Multiple evacuation routes, including specific hospital destinations, were pre-planned and known by the team, with real-time navigation support during exfiltration.
  • Summary: Security had established and plugged in routes to multiple venues, prioritizing the closest Level Three hospital despite local laws regarding ambulance standby being outside their control. A dedicated team member provided real-time navigation support to the driver during the emergency transport. The team understood that in an emergency, immediate self-evacuation is paramount, overriding reliance on external medical standby.
Shooter Position and Tactical Loopholes
Copied to clipboard!
(01:29:00)
  • Key Takeaway: The shooter utilized a highly specific, small vantage point on the roof that provided a tactical loophole, which the security team could not see due to line-of-sight obstruction.
  • Summary: The speaker focused on determining when the shooter accessed the roof, noting the shot originated from a very specific, small area that offered a tactical advantage. This position was not within the security team’s primary area of responsibility, which was focused on the 3,000 immediate threats in front of them. The security team routinely rehearses shots from various declination angles to prepare for such scenarios.
Hand Signals and Communication Protocols
Copied to clipboard!
(01:36:10)
  • Key Takeaway: Definitive, necessary hand signals are used only for specific details like sniper operations, not for routine communication within the main protective bubble team.
  • Summary: Hand-in-arm signals are standard practice on many details, but they were not used by this team during the event to avoid tying up radio nets or causing confusion. Communication within the bubble team relies on direct radio contact or simple visual cues to gain attention, as complex hand signals can be misinterpreted as directives. Signals must be definitive and necessary to avoid confusing team members focused on their area of responsibility.
First Amendment Misuse and Consequences
Copied to clipboard!
(01:40:04)
  • Key Takeaway: The First Amendment is being weaponized as a ‘sword’ of public opinion through lies, rather than serving as a ‘shield’ for free speech, necessitating accountability.
  • Summary: The founding fathers intended the First Amendment as a shield for the voice of the people against hierarchy, but it is now used as a sword to spread falsehoods for clicks. The speaker advocates for immediate consequences for malicious lies, referencing a ‘way back machine’ where slander resulted in physical confrontation. The proliferation of baseless rumors, like those concerning exploding microphones, highlights this misuse.
Immediate Gunfire Response and Medical Aid
Copied to clipboard!
(01:42:37)
  • Key Takeaway: The security team instantly recognized the rifle fire and slap of the bullet, initiating cover and direct wound packing within five seconds.
  • Summary: Brian Harpole identified the sound as rifle fire, distinct from other loud noises, and immediately turned toward Charlie as the bullet struck. Dan grabbed Charlie, and Brian immediately dove on top to provide concealment and apply direct pressure to the carotid artery wound, noting the severity by the amount of blood loss. The team initiated the evacuation protocol (‘Xfil’) within 15-16 seconds of the shot.
Emergency Exfiltration and Medical Care
Copied to clipboard!
(01:53:37)
  • Key Takeaway: The team executed a practiced, high-speed evacuation while simultaneously administering critical, non-stop hemorrhage control in a moving vehicle.
  • Summary: Due to the neck wound location, direct pressure could not be maintained while moving, forcing the team to rapidly load Charlie into a slick SUV. Brian administered massive wound packing (36 feet of dressing) while kneeling outside the open door, held in place by Rick, as Justin drove aggressively through traffic. This rapid movement off the ‘X’ is a fundamental rule for security and military operations when under fire.
Hospital Transfer and Post-Incident Actions
Copied to clipboard!
(02:01:22)
  • Key Takeaway: Upon arrival, the team ensured Charlie was transferred to medical staff, then immediately stood guard outside the room while awaiting status updates on other potential victims.
  • Summary: The team carried Charlie into the hospital, placed him on a gurney, and provided critical patient information, including the need for defibrillation, before stepping back. Brian and Rick were covered in blood, prompting a nurse to compassionately wash their faces. The security team members who remained at the scene were later tasked by the Chief of Police to secure the crime scene, a deviation from standard protocol.
Autopsy Confirmation and Bullet Travel
Copied to clipboard!
(02:07:51)
  • Key Takeaway: An autopsy was definitively performed as requested by the security team and confirmed by the OR doctor, refuting online claims of its absence.
  • Summary: The OR doctor confirmed that Charlie received a pulse after arrival and was taken to surgery, noting his strong heart allowed him to survive the initial jugular shot. The security team specifically requested an immediate autopsy to prevent conspiracy theories, and the local SO/State Police handled the body transfer to the ME that night. The speaker confirmed there was no exit wound, despite expectations for a blowout from a high-velocity round.
Media Distrust and Accountability
Copied to clipboard!
(02:19:16)
  • Key Takeaway: A significant majority (70%) of Americans distrust the media, indicating a systemic failure in information delivery that allows platforms to monetize lies similar to old tabloid models.
  • Summary: People are chastised online for telling the truth, leading to confusion over who to believe. Polls show 70% of Americans do not believe the media, suggesting these outlets are failing their audience. Social media platforms are criticized for monetizing these lies, effectively acting as modern-day National Enquirers.
Self-Correction and Oversight
Copied to clipboard!
(02:12:03)
  • Key Takeaway: Truth seekers must be willing to critically examine and poke holes in their own narratives, as institutional oversight to ensure accuracy has largely disappeared.
  • Summary: It is crucial to be willing to poke holes in one’s own story, not just others’. If one is a true truth seeker, self-scrutiny is necessary. The oversight mechanism that enforces this critical self-examination is currently absent.
Debunking Handoff Rumors
Copied to clipboard!
(02:21:54)
  • Key Takeaway: The alleged exchange of items between security personnel or with a female attendee was confirmed to be a non-event, with the item being mints handed out by a staff member named Chrissy.
  • Summary: Internet chatter suggested a clandestine handoff occurred near the principal. The footage reviewed showed a woman, Chrissy, who works there, handing out mints and ensuring hydration for the team. This action was confirmed by the guest as routine support, not an illicit exchange.
AV Team Member Actions
Copied to clipboard!
(02:24:07)
  • Key Takeaway: An individual from the contracted audio-visual team was observed taking a selfie video immediately after the shooting and later removing an SD card from a camera near the scene, though the footage was reportedly turned over to the FBI.
  • Summary: A man associated with the AV team, responsible for shooting footage, was seen taking a selfie video near the vehicles after the shooting. This same individual was later seen pulling down a camera and appearing to remove the SD card. The guest confirmed this footage was turned over to the FBI, clarifying the individual was a contractor, not security staff.
Internal Leaks and Security Integrity
Copied to clipboard!
(02:27:06)
  • Key Takeaway: Brian Harpole found no evidence suggesting internal leaks or betrayal within the TPUSA or security team facilitated the attack, noting that corporate internal matters would be unknown to the security contractor.
  • Summary: The guest stated he saw nothing to indicate an inside job or conspiracy involving his security team members. He emphasized that making allegations of conspiracy to murder requires definitive proof, otherwise, there must be consequences for false claims. The guest expressed faith in the system’s ability to prosecute, despite acknowledging its general brokenness.
Justification for Footage Withholding
Copied to clipboard!
(02:29:26)
  • Key Takeaway: The FBI’s control over releasing security footage is supported by the guest based on the judge’s gag order citing a ‘voluminous’ amount of evidence that could taint a jury pool, though this lack of communication breeds distrust.
  • Summary: The guest agrees with the FBI’s decision to withhold footage to protect the suspect’s right to a fair trial, acknowledging the volume of evidence. However, he argues that institutions should release some information to confirm investigation steps, rather than just saying they will update the public later. This silence is what causes people to suspect institutions are hiding things, referencing the Epstein files as an example of trust erosion.
Crime Scene Integrity and FOIA
Copied to clipboard!
(02:34:01)
  • Key Takeaway: The rapid paving over of the crime scene demands a Freedom of Information Act (FOIA) request to obtain the budget requests and plans, as this action should have generated traceable paperwork.
  • Summary: The guest questions the extreme urgency to pave over the crime scene before evidence collection was complete, suggesting it might be an attempt to cover up a supposed ’trapdoor’ or internal issue. He urges filing a FOIA request for the school’s plans and budget approvals related to the demolition. This paperwork should exist and is not protected by the evidentiary gag order.
Bullet Fragmentation and Wounds
Copied to clipboard!
(02:35:43)
  • Key Takeaway: If the bullet struck any bone, it would have fragmented into pieces, explaining the lack of a recoverable bullet, as the projectile hit and shattered the C6 vertebra.
  • Summary: If a bullet hits bone, it fragments, meaning no intact bullet would be recovered. The doctor informed the team that the bullet entered, hit the vertebra (C6), crushed it, shattered it, and continued through the wound cavity before fragmenting. Releasing this specific medical detail would clarify the exit wound debate without jeopardizing the trial.
Witness George Zen’s Background
Copied to clipboard!
(02:37:53)
  • Key Takeaway: George Zen, a purported witness who claimed to have the shooter in custody, has a history of appearing at major incidents and was later arrested for child pornography.
  • Summary: George Zen was identified as a person of interest who appeared at the scene, claiming custody of the shooter, and security personnel assisted police in securing him. His history includes being a witness at 9/11 and the Salt Lake City marathon bomb threat. His subsequent arrest for child pornography raises questions about his credibility and presence at the event.
Investigating the Shooter’s Network
Copied to clipboard!
(02:39:26)
  • Key Takeaway: To determine if the shooter was a lone wolf or part of a conspiracy, investigators must release phone logs, tower data, and interview the shooter’s coworkers and friends.
  • Summary: The public needs information on the shooter’s connections, including who he worked with and who he communicated with days prior, accessible via phone logs and tower hits. The question remains whether he was a lone wolf or assisted, similar to the Timothy McVey case where assistance was later revealed. Information about how the rifle was handled (disassembled with a screwdriver) and transported from the roof is also critical.
Attacks on the Victim’s Wife
Copied to clipboard!
(02:43:13)
  • Key Takeaway: Allegations circulating online that the victim’s wife was involved in his death are baseless, causing immense pain to a grieving spouse who is clearly a victim.
  • Summary: The guest expresses outrage over baseless claims that the victim’s wife, Erica, was involved in the killing, noting that he has witnessed the genuine pain of death notifications. Allowing platforms to host unsubstantiated allegations against a grieving spouse goes against fundamental decency and erodes societal values. The public must hold itself accountable for the leaders it gets, as current behavior reflects a lack of self-accountability.