Tactical Support Service helps minimize costly disruptions to your business that could be a consequence of a labor dispute. We have a proven good reputation for excellence in the business, gained during 25 years of experience meeting the labor crisis security needs of over 2,000 clients in america and Canada. Special Response Corporation teams and/or TeamWorks USA, Inc personnel might be deployed to your location with 24 hours notice or less. Our security specialists are workers of Special Response Corporation, on stand by status, awaiting deployment.
Our teams include professional, disciplined and strike security companies with extensive law enforcement or military experience, educated to meet your security needs. Labor Dispute/Strike Security Services offered include:
We have now worked with clients in such industries as: aggregate, utility, energy, paper, manufacturing, distribution, warehousing, chemical, hospitality, grocery/retail, entertainment, media, healthcare, construction, pharmaceutical, waste haulers, telecommunications, defense contractors, and transportation.
Protecting one’s information against the threat of technical interception, or eavesdropping, is complicated by the variety of techniques, which an eavesdropper has at his disposal. If he is going to intercept the information, he might employ any or all combinations of threat techniques. The degree of his determination will likely be affected by the price of information (to him). The problems presented from the area where the eavesdropper must operate will even influence the choice of threat techniques. Those items that limit the strategies at his disposal are the physical standards and safeguards within the target area, his very own capabilities along with his access to specialists that may broaden his capabilities.
In evaluating the technical interception threat, several questions must be answered. Exactly what is the value of information to the potential eavesdropper? This value, which might be completely different from its value to the owner from the information, has a tendency to establish the threat level (the extent and expense that the eavesdropper will go to gain the data). In addition, it establishes, to some degree, the chance he is going to take to acquire the information. Obviously, if the details are of relatively low value, the eavesdropper will expend relatively little money and time and expose him/herself to hardly any risk.
Who constitutes the threat? This query is most beneficial answered by determining who can be helped by the interception. Based on who and what benefit may be determined, there is certainly some grounds for an analysis of technical capability and probability that specialist is going to be employed.
What exactly is the desired duration of the interception? When the duration is short, (a two hour conference as an example) some interception techniques are more convenient and probably be used more than others. When the desired duration is definitely an extended one (including continuous monitoring of your office), techniques requiring batteries within the target area will probably be applied.
Answering questions 1 through 3 may be relatively simple. The solution to question 4 normally requires expert evaluation of the specific problem area, when the evaluation is to be accomplished in-depth. However, consideration in the data derived from the above mentioned questions will permit the non-specialist to help make a minimum of general threat evaluations.
Set aside an area solely for the use of negotiating officials when discussing any part of the negotiations. Ideally, this room could be at the end of a corridor, above ground level or in a basement area. (Rooms or suites within a hotel could be adapted for this purpose.) Walls should be solid concrete block and extend from your true ceiling to the floor. In the event the room has connecting doors, both rooms needs to be designated as secure areas and controlled accordingly. If rooms with solid walls can not be acquired, irgbmh for controlling adjoining rooms needs to be made.
Examine the space(s) just before initial use to insure you will find no security weaknesses (speakers, vents, false walls, etc of listening devices, which will compromise your position. A physical and electronic examination of the area(s) may be needed on the recurring basis during negotiations. Secure the space before the examination and sustain the security posture throughout the entire duration of negotiations. Another utilization of security disciplines ought to be put in effect with the use of: joint use home security systems/security personnel, utilizing corporate personnel, off duty police officers or private security personnel. Insure that security personnel usually are not sympathetic for the opposing party. Alter the lock(s), utilizing outside locksmith services, if practical. Institute a mandatory key control and access codes.