Tactical Support Service helps reduce expensive disruptions to your business which could are caused by a labor dispute. We have a proven good reputation for excellence in the industry, gained during twenty-five years of experience meeting the labor crisis security needs of over 2,000 clients in america and Canada. Special Response Corporation teams and/or TeamWorks USA, Inc personnel may be deployed to your location with 24 hours notice or less. Our security experts are employees of Special Response Corporation, on stand by status, awaiting deployment.
Our teams consist of professional, disciplined and labor strike security companies with extensive law enforcement or military experience, educated to meet your security needs. Labor Dispute/Strike Security Services offered include:
We now have worked with clients in these industries as: aggregate, utility, energy, paper, manufacturing, distribution, warehousing, chemical, hospitality, grocery/retail, entertainment, media, healthcare, construction, pharmaceutical, waste haulers, telecommunications, defense contractors, and transportation.
Protecting one’s information up against the threat of technical interception, or eavesdropping, is complicated by the range of techniques, which an eavesdropper has at his disposal. If he is going to intercept the information, he may employ any or all combinations of threat techniques. The level of his determination will be affected by the value of information (to him). The difficulties presented by the area in which the eavesdropper must operate may also influence the choice of threat techniques. Those things that limit the techniques at his disposal are the physical standards and safeguards within the target area, their own capabilities along with his access to specialists that will broaden his capabilities.
In evaluating the technical interception threat, several questions must be answered. Exactly what is the value of information towards the potential eavesdropper? This value, which may be very different looking at the value towards the owner of the information, has a tendency to establish the threat level (the extent and expense which the eavesdropper should go to get the data). Additionally, it establishes, to some extent, the risk he will require to get the details. Obviously, if the details are of relatively low value, the eavesdropper will expend relatively little money and time and expose him/herself to almost no risk.
Who constitutes the threat? This query is most beneficial answered by determining who may benefit from the interception. Based on who and what benefit can be determined, there exists some grounds for an analysis of technical capability and probability that specialist will likely be employed.
Exactly what is the desired duration of the interception? In the event the duration is short, (a two hour conference as an example) some interception techniques are more convenient and apt to be used greater than others. In the event the desired duration is definitely an extended one (such as continuous monitoring of the office), techniques requiring batteries in the target area will probably be utilized.
Answering questions 1 through 3 might be relatively easy. The solution to question 4 normally requires expert evaluation in the specific problem area, when the evaluation is to be accomplished in-depth. However, consideration from the data derived from the above questions allows the non-specialist to help make a minimum of general threat evaluations.
Set aside a room solely for the use of negotiating officials when discussing any part of the negotiations. Ideally, this room could be at the conclusion of a corridor, above ground level or in a basement area. (Rooms or suites within a hotel may be adapted for this purpose.) Walls ought to be solid concrete block and extend from the true ceiling to the floor. If the room has connecting doors, both rooms needs to be designated as secure areas and controlled accordingly. If rooms with solid walls cannot be acquired, irgbmh for controlling adjoining rooms needs to be made.
Examine the area(s) just before initial use to insure there are no security weaknesses (speakers, vents, false walls, etc of listening devices, which would compromise your position. A physical and electronic examination of the room(s) is usually necessary on a recurring basis during negotiations. Secure the space ahead of the examination and keep the protection posture through the entire period of negotiations. The other utilization of security disciplines should be invest effect with the use of: joint use home security systems/security personnel, utilizing corporate personnel, off duty law enforcement officers or private security personnel. Insure that security personnel usually are not sympathetic for the opposing party. Change the lock(s), utilizing outside locksmith services, if practical. Institute a mandatory key control and access codes.