Tactical Support Service helps minimize pricey disruptions to your business which could are caused by a labor dispute. We have a proven reputation for excellence in the market, gained during twenty five years of experience meeting the labor crisis security needs of over 2,000 clients in america and Canada. Special Response Corporation teams and/or TeamWorks USA, Inc personnel could be deployed to your location with twenty four hours notice or less. Our security specialists are employees of Special Response Corporation, on stand by status, awaiting deployment.

Our teams contain professional, disciplined and labor unrest security with extensive police force or military experience, educated to meet your security needs. Labor Dispute/Strike Security Services offered include:

We now have dealt with clients in such industries as: aggregate, utility, energy, paper, manufacturing, distribution, warehousing, chemical, hospitality, grocery/retail, entertainment, media, healthcare, construction, pharmaceutical, waste haulers, telecommunications, defense contractors, and transportation.

Protecting one’s information against the threat of technical interception, or eavesdropping, is complicated by the variety of techniques, which an eavesdropper has at his disposal. If he or she is determined to intercept the details, he may employ any or all mixtures of threat techniques. The level of his determination is going to be relying on the price of information (to him). The difficulties presented by the area where the eavesdropper must operate may also influence the option of threat techniques. Those items to limit the methods at his disposal are the physical standards and safeguards within the target area, their own capabilities along with his use of specialists that may broaden his capabilities.

In evaluating the technical interception threat, several questions has to be answered. What is the value of information to the potential eavesdropper? This value, which may be totally different from the value to the owner from the information, is likely to establish the threat level (the extent and expense which the eavesdropper should go to get the data). It also establishes, to some degree, the chance he is going to take to obtain the information. Obviously, if the information is of relatively low value, the eavesdropper will expend relatively little money and time and expose him/herself to very little risk.

Who constitutes the threat? This question is best answered by determining who may benefit from the interception. Based on who and what benefit may be determined, there exists some basis for an analysis of technical capability and probability that specialist is going to be employed.

What is the desired duration of the interception? In the event the duration is short, (a two hour conference for instance) some interception techniques are more convenient and likely to be used more than others. When the desired duration is definitely an extended one (such as continuous monitoring of an office), techniques requiring batteries in the target area will probably be used.

Answering questions 1 through 3 may be relatively simple. The solution to question 4 normally requires expert evaluation of the specific problem area, if the evaluation is to be accomplished in-depth. However, consideration from the data produced from the above mentioned questions will permit the non-specialist to help make at least general threat evaluations.

Put aside an area solely for the usage of negotiating officials when discussing any aspect of the negotiations. Ideally, this room would be after a corridor, above ground level or in a basement area. (Rooms or suites inside a hotel may be adapted for this specific purpose.) Walls needs to be solid concrete block and extend from the true ceiling for the floor. When the room has connecting doors, both rooms ought to be designated as secure areas and controlled accordingly. If rooms with solid walls can not be acquired, irgbmh for controlling adjoining rooms ought to be made.

Examine the area(s) before initial use to insure you can find no security weaknesses (speakers, vents, false walls, etc of listening devices, which will compromise your position. A physical and electronic study of the room(s) may be required over a recurring basis during negotiations. Secure the space ahead of the examination and maintain the security posture through the entire period of negotiations. Another use of security disciplines needs to be put in effect through the use of: joint use home security systems/security personnel, utilizing corporate personnel, off duty law enforcement officers or private security personnel. Insure that security personnel are not sympathetic to the opposing party. Alter the lock(s), utilizing outside locksmith services, if practical. Institute a mandatory key control and access codes.

Copeland