When was the last time your corporate travel department gave you some timely INTEL? Maybe you got a report on the current level of risk in the region, city or country you are now scheduled to visit in the next few days.
What are you going to do if everything goes “South” in a matter of seconds or minutes?
The Mission
In situations that require instinctive response, you have to go beyond the traditional travel management report on what to do and who to call. You have to act and make decisions on your own.
In order to survive, one must be trained on the authoritative, detailed description of the methods by which terrorist organizations, hostile intelligence services, and criminal groups select and target specific individuals. Individuals and a team must learn how they can detect and counter potential threats against them, and their sponsoring organizations to better manage these operational risks.
These threats could include recruitment by a hostile service, kidnapping or assassination by terrorist and criminal elements or espionage by business competitors. Combined with real-time INTEL, you must receive intense, real-time instruction in surveillance detection and counter-surveillance so that you can take appropriate actions.
Combining real-time intelligence with a focused surveillance and threat detection-training program is exactly what savvy corporate executives and Chief Security Officers are looking for from a single source. Personnel threat management is a prudent risk mitigation solution. This combination is one key strategy to mitigate the operational risks associated with key personnel in your organization.
Individuals whose occupations place them at risk may include people with access to valuable proprietary information or holders of high level security clearances, the wealthy and those responsible for their safety.
What may be more vital is the use of "Coopers Colors:":
"By using a well-practiced, concrete, formulaic train of thought, it prevents the hesitation normally experienced when one is under threat of attack or actual attack, and this is the purpose of the code, to prevent unnecessary hesitation, and to apply only that force which is necessary to defend yourself." "The way Jeff Cooper explains it is:"
- White - relaxed and fairly oblivious of your surroundings, you should only be in this condition if you are at home or another secure setting behind locked doors.
- Yellow - the state of not only constant awareness, but the constant recognition of possible threats. In this state, you are observant of your surroundings, allowing you to recognize threats if they present themselves.
- Orange - in this state, you have recognized a potential threat, and are ready to defend yourself against this threat if necessary.
- Red - you are actively defending yourself or others against a threat that has presented itself to you.
It's not just about general awareness, it's about positively identifying potential and actual threats, as you go about your daily life. It is this threat identification and acquisition process that is so valuable, that reduces your response time to those threats, if they present themselves.
The Take Away
Combine two parts “Threat Detection & Management” with one part INTEL and you have the perfect combination to ensure the successful completion of corporate missions across the globe.
No comments:
Post a Comment