Tactical Support Service helps minimize expensive disruptions to your business that may result from a labor dispute. We have a proven good reputation for excellence in the market, gained during twenty-five years of experience meeting the labor crisis security needs well over 2,000 clients in the usa and Canada. Special Response Corporation teams and/or TeamWorks USA, Inc personnel might be deployed to your location with 24 hours notice or less. Our security experts are employees of Special Response Corporation, on stand by status, awaiting deployment.
Our teams include professional, disciplined and strike security companies with extensive law enforcement or military experience, taught to meet your security needs. Labor Dispute/Strike Security Services offered include:
We have now dealt with clients in these industries as: aggregate, utility, energy, paper, manufacturing, distribution, warehousing, chemical, hospitality, grocery/retail, entertainment, media, healthcare, construction, pharmaceutical, waste haulers, telecommunications, defense contractors, and transportation.
Protecting one’s information against the threat of technical interception, or eavesdropping, is complicated by the variety of techniques, which an eavesdropper has at his disposal. If he or she is going to intercept the data, he may employ any or all combinations of threat techniques. The amount of his determination will likely be relying on the price of information (to him). The problems presented from the area wherein the eavesdropper must operate will also influence the option of threat techniques. Those items that limit the methods at his disposal include the physical standards and safeguards inside the target area, their own capabilities and his use of specialists that will broaden his capabilities.
In evaluating the technical interception threat, several questions should be answered. What exactly is the worth of information to the potential eavesdropper? This value, which can be very different from its value towards the owner from the information, tends to establish the threat level (the extent and expense to which the eavesdropper should go to achieve the information). Additionally, it establishes, to some degree, the risk he is going to take to acquire the information. Obviously, if the information is of relatively low value, the eavesdropper will expend relatively little money and time and expose him/herself to hardly any risk.
Who constitutes the threat? This question is best answered by determining who can be helped by the interception. Depending on who and what benefit could be determined, there is certainly some grounds for an analysis of technical capability and probability that specialist will be employed.
Exactly what is the desired length of the interception? When the duration is short, (a two hour conference as an example) some interception techniques are more convenient and apt to be used more than others. In the event the desired duration is an extended one (such as continuous monitoring of an office), techniques requiring batteries inside the target area are more inclined to be used.
Answering questions 1 through 3 might be relatively easy. The reply to question 4 normally requires expert evaluation of the specific problem area, if the evaluation will be accomplished in-depth. However, consideration of the data produced from the aforementioned questions allows the non-specialist to help make at the very least general threat evaluations.
Put aside a room solely for the usage of negotiating officials when discussing any aspect of the negotiations. Ideally, this room will be at the end of a corridor, above ground level or in a basement area. (Rooms or suites within a hotel can be adapted for this function.) Walls should be solid concrete block and extend from your true ceiling for the floor. If the room has connecting doors, both rooms needs to be designated as secure areas and controlled accordingly. If rooms with solid walls can not be acquired, irgbmh for controlling adjoining rooms should be made.
Examine the space(s) before initial use to insure you will find no security weaknesses (speakers, vents, false walls, etc of listening devices, which will compromise your position. An actual and electronic study of the area(s) is usually necessary on the recurring basis during negotiations. Secure the room prior to the examination and keep the safety posture during the entire period of negotiations. The other usage of security disciplines needs to be devote effect with the use of: joint use home security systems/security personnel, utilizing corporate personnel, off duty police officers or private security personnel. Insure that security personnel are not sympathetic towards the opposing party. Modify the lock(s), utilizing outside locksmith services, if practical. Institute a mandatory key control and access codes.