Tactical Support Service helps minimize expensive disruptions to your business that could are caused by a labor dispute. We have a proven reputation for excellence in the market, gained during twenty-five years of experience meeting the labor crisis security needs well over 2,000 clients in the United States and Canada. Special Response Corporation teams and/or TeamWorks USA, Inc personnel might be deployed to your location with 24 hours notice or less. Our security specialists are employees of Special Response Corporation, on stand by status, awaiting deployment.
Our teams consist of professional, disciplined and strike security with extensive police force or military experience, trained to meet your security needs. Labor Dispute/Strike Security Services offered include:
We have worked with clients in such industries as: aggregate, utility, energy, paper, manufacturing, distribution, warehousing, chemical, hospitality, grocery/retail, entertainment, media, healthcare, construction, pharmaceutical, waste haulers, telecommunications, defense contractors, and transportation.
Protecting one’s information against the threat of technical interception, or eavesdropping, is complicated by the variety of techniques, which an eavesdropper has at his disposal. If he or she is going to intercept the data, he may employ any or all mixtures of threat techniques. The level of his determination will likely be influenced by the price of information (to him). The problems presented by the area where the eavesdropper must operate will even influence the choice of threat techniques. Those things that limit the techniques at his disposal range from the physical standards and safeguards inside the target area, his very own capabilities along with his use of specialists that can broaden his capabilities.
In evaluating the technical interception threat, several questions has to be answered. Exactly what is the worth of information for the potential eavesdropper? This value, which can be totally different looking at the value for the owner of the information, has a tendency to establish the threat level (the extent and expense which the eavesdropper will go to get the information). It also establishes, to some extent, the risk he will take to acquire the details. Obviously, if the details are of relatively low value, the eavesdropper will expend relatively little time and money and expose him/herself to hardly any risk.
Who constitutes the threat? This question is better answered by determining who can benefit from the interception. According to who and what benefit can be determined, there is certainly some grounds for an analysis of technical capability and probability that specialist will be employed.
What exactly is the desired length of the interception? In the event the duration is short, (a two hour conference for instance) some interception techniques tend to be more convenient and likely to be used a lot more than others. When the desired duration is definitely an extended one (including continuous monitoring of an office), techniques requiring batteries inside the target area will probably be used.
Answering questions 1 through 3 could be easy. The answer to question 4 normally requires expert evaluation in the specific problem area, in the event the evaluation is going to be accomplished in-depth. However, consideration in the data derived from the above questions will allow the non-specialist to create a minimum of general threat evaluations.
Set aside an area solely for the use of negotiating officials when discussing any part of the negotiations. Ideally, this room could be at the end of a corridor, above ground level or in a basement area. (Rooms or suites inside a hotel could be adapted for this specific purpose.) Walls should be solid concrete block and extend through the true ceiling for the floor. When the room has connecting doors, both rooms should be designated as secure areas and controlled accordingly. If rooms with solid walls can not be acquired, irgbmh for controlling adjoining rooms needs to be made.
Examine the room(s) before initial use to insure you can find no security weaknesses (speakers, vents, false walls, etc of listening devices, which will compromise your position. A physical and electronic examination of the area(s) may be required on a recurring basis during negotiations. Secure the space prior to the examination and keep the protection posture through the entire time of negotiations. One other use of security disciplines should be devote effect through the use of: joint use security systems/security personnel, utilizing corporate personnel, off duty law enforcement officers or private security personnel. Insure that security personnel are certainly not sympathetic for the opposing party. Change the lock(s), utilizing outside locksmith services, if practical. Institute a mandatory key control and access codes.