Tactical Support Service helps minimize pricey disruptions to your business which could be a consequence of a labor dispute. We have a proven reputation for excellence in the business, gained during 25 years of experience meeting the labor crisis security needs of over 2,000 clients in america and Canada. Special Response Corporation teams and/or TeamWorks USA, Inc personnel could be deployed to your location with 24 hours notice or less. Our security specialists are workers of Special Response Corporation, on stand by status, awaiting deployment.
Our teams include professional, disciplined and labor strike security companies with extensive police force or military experience, taught to meet your security needs. Labor Dispute/Strike Security Services offered include:
We now have worked with clients in these industries as: aggregate, utility, energy, paper, manufacturing, distribution, warehousing, chemical, hospitality, grocery/retail, entertainment, media, healthcare, construction, pharmaceutical, waste haulers, telecommunications, defense contractors, and transportation.
Protecting one’s information up against the threat of technical interception, or eavesdropping, is complicated by the variety of techniques, which an eavesdropper has at his disposal. If he is going to intercept the information, he may employ any or all mixtures of threat techniques. The degree of his determination is going to be affected by the value of information (to him). The issues presented through the area in which the eavesdropper must operate may also influence deciding on a threat techniques. Those things to limit the techniques at his disposal range from the physical standards and safeguards in the target area, his very own capabilities along with his usage of specialists that may broaden his capabilities.
In evaluating the technical interception threat, several questions should be answered. What exactly is the worth of information to the potential eavesdropper? This value, which may be completely different from the value towards the owner from the information, has a tendency to establish the threat level (the extent and expense that the eavesdropper should go to get the information). It also establishes, to some degree, the danger he will require to acquire the details. Obviously, if the information is of relatively low value, the eavesdropper will expend relatively little time and money and expose him/herself to very little risk.
Who constitutes the threat? This query is better answered by determining who can benefit from the interception. Depending on who and what benefit can be determined, there is some basis for an analysis of technical capability and probability that specialist will likely be employed.
What exactly is the desired length of the interception? When the duration is short, (a two hour conference as an example) some interception techniques are more convenient and apt to be used a lot more than others. When the desired duration is surely an extended one (including continuous monitoring of an office), techniques requiring batteries within the target area will probably be used.
Answering questions 1 through 3 might be relatively easy. The reply to question 4 normally requires expert evaluation of the specific problem area, when the evaluation is to be accomplished in-depth. However, consideration of the data based on the above questions will allow the non-specialist to make a minimum of general threat evaluations.
Set aside a room solely for using negotiating officials when discussing any aspect of the negotiations. Ideally, this room would be at the conclusion of a corridor, above ground level or in a basement area. (Rooms or suites within a hotel could be adapted for this specific purpose.) Walls ought to be solid concrete block and extend from the true ceiling for the floor. In the event the room has connecting doors, both rooms should be designated as secure areas and controlled accordingly. If rooms with solid walls can not be acquired, irgbmh for controlling adjoining rooms should be made.
Examine the area(s) before initial use to insure there are no security weaknesses (speakers, vents, false walls, etc of listening devices, which may compromise your position. An actual and electronic study of the space(s) may be needed over a recurring basis during negotiations. Secure the area prior to the examination and maintain the security posture throughout the entire time of negotiations. Another utilization of security disciplines ought to be invest effect with the use of: joint use home security systems/security personnel, utilizing corporate personnel, off duty police officers or private security personnel. Insure that security personnel usually are not sympathetic to the opposing party. Alter the lock(s), utilizing outside locksmith services, if practical. Institute a mandatory key control and access codes.