International Dynamics Research Corp.   

Hostage Recovery, Kidnap Protection, Physical and Computer Security Plan

IDRC can provide your organization with a turn key Physical and Information Security Plan and Policy


IDRC has successfully completed a number of significant security consulting and engineering projects.  These successful projects demonstrate IDRC’s ability to meet design schedules, staffing, estimate costs, and administrate complex consulting, design, turn key security projects. 

IDRC’s projects include conducting complete Vulnerability Assessments of Asset Management for Fortune 500 companies and Overseeing the complete implementation of a new Comprehensive Asset Management Program that has saved clients millions of dollars in losses.  

Other projects include the implementation of muti-million dollar physical security upgrades to Oil Companies; the world wide asset management and executive protection program for a Middle East Royal family; a detailed armed robbery prevention study for a convenient store chain; a comprehensive physical security and loss prevention study for several computer firms; Hostage recovery operations in North and South America, Middle East, and Europe. 

Security consulting projects for designing and implementing an Information Security and Technical Counter Measures program (De-bugging) for major corporations worldwide; along with a number of other significant projects in the US, Germany, Mexico, Cayman Islands, Peru, Russia, Austria, Lebanon, and Canada.

Physical and Information Security

IDRC is prepared to full-fill your firms desires to evaluate your current Physical and Information Protection Programs against industry “best practices” and generally accepted security principles.  Assessment, analysis and recommendations must be aligned with the vision, mission, and operating values and be tailored to your world wide presence, business culture and operating environment.  Solutions must be comprehensive and adaptable to Your corporations existing business processes.  Although a detailed Scope of Work has not been finalized, the areas outlined below will provide the foundation for and information security review.  Areas can be added and deleted as requested by Your Security organization.                                               

The following methodology will be used to assess the current Information Protection Program at your facility.

  • Gather data relative to the current Physical Security and Information Protection Programs.
  • Compare the data with industry “best practices” and generally accepted security principles.
  • Analyze the data to determine the current condition of the program.
  • Identify and communicate the gap between what is and what should be.
  • Identify and prioritize management’s concerns.
  • Develop an acceptable strategy and resource estimate to close the gap between what is and what should be.

 While we provide protection, we can train your executives in protective measures such as:

Due
     EXECUTIVE PROTECTION

     IDRC has a long established history of designing, establishing and conducting protective operations in Business, Royalty, Industry, Music, Presidential 
             Committee Members, Political, Battered Spouse and Combat situations from terrorist and or criminal acts.   In that time, NO person utilizing International
           Dynamics services have been abducted or injured due to the ability of  our professional staff to recognize, neutralize and subdue all such attempts.  From tha    t experience comes the now critical program of Executive Protection and training.  We initiate our details buy completing a Threat Analysis, Interviews with
     the Principals, Develop a Security Plan and then conduct ,
specific training to neutralize the known  threats revealed in the assessment.  Training will
    be  conducted for the Principal and their family as well as for all employees or individuals that will be near the Principal.  This training is to brief
          them on Counter Surveillance and basic situation avoidance information.  Individuals will also be briefed on what they can expect for
          the protective agents and what the protective agents will expect from them.


          IDRC has agents with experience in all areas of the protective industry and will strive to assign individuals that will not only fit into your 
          environment but also have personalities that will mesh well with your situation.


          THE most important aspect of a protective detail is Intelligence and Advance preparation.   We have team leaders that are known
int      Internationally for their knowledge and experience in this field.  We will insure that your travel will be as smooth as possible.  IDRC Agents
          are well traveling and experienced with most parts s of the world and we have many multilingual agents to increase your probability of
         uneventful travel.   IDRC has training and equipped agents capable of providing protective services, Counter Sniper,   Advanced Detail, EOD,
       HazMat and Combat Protective missions.   All of IDRC's operatives are Certified Master Anti Terrorism Specialist as well as being trained in
         Martial Arts.  All of IDRC's management, Team Leaders and Protective Specialist are POST certified Law Enforcement officers with a minimum of 5 years experience.

      
          IDRC has the ability to train and protect the Executive clients in the procedures necessary to limit their exposure to hostile threats.

          You can have the professional protection of International Dynamics Research Corp staff, or Executive Security Training, or both
          Simultaneously!  While we provide protection, we can train your executives in the protection measures such as:


          TRAVEL SECURITY:  Domestic, Extended and International travel security.  How to utilize varying route techniques, Situation Avoidance,
          Dressing for Avoidance, High Risk carriers and High Risk Location awareness.

       
          SECURE WORKPLACE: Layering accessibility and the use of buffer zones, Habit controls,Environmental risk reduction, Computing awareness, 
          Automobile travel and security, Situation awareness and risk analysis.


          
A       ANTI-EAVESDROPPING and INFORMATION SECURITY: Type of intrusive devices, Phrase coding conversation, Controlled communication access,
          Environmental privacy, Telecommunications security, written and document security.

       
SITUATION AVOIDANCE, PREVENTION AND UNCONVENTIONAL RESPONSES: Planning for avoidance and prevention, Methodology of avoidance,
          Alternatives in avoidance and prevention planning, Elimination of residential and family vulnerability, and Unconventional response to
          threats or situations.

          
US      USE OF SECURITY PERSONNEL:  Qualifications or personnel, Personnel placement, Security personnel as a screen, Importance of heeding the
          protective protective personnel, Response to personnel actions.


O       OPTIONAL COURSES: In defensive weapons training in both conventional and unconventional weaponry.  This course is also optional for the fa       family or the executive as well as for executives key employees.  The family should always be part of the courses in travel, situation avoidance a    d residential security.

 WORKPLACE VIOLENCE 

There is no greater threat to the synergy of a company’s operations than a disgruntled employee of an ex-patriot with a vendetta.  The early warning procedures we have instituted over the last 20 years to ensure work place safety and security have become policy for many of the most recognized national and international corporations.  Our perspective is that one should always try to diffuse a violent situation early in its evolution, before a “Loose Cannon” rocks the boat.

This is accomplished though Situation Avoidance and Safety Training.  Our firm has designed a safety training program with a dual purpose.  The first is to comply with court rulings regarding the reduction of your liability exposure.  The liability would stem from employee’s physical confrontations, to include such things as assault, rape, and or robbery.  Secondly, we provide an educational program for your employees on how to avoid a potentially dangerous situation.

Liability Reduction:

We will conduct situation avoidance training seminars for your employees.  This seminar will be customized to your particular needs at your facility.  The block of instruction deals with criminal motivation, corporate liability, criminal assault’s, and the best way to approach them.  Also covered are hostage situations in the workplace, active shooters in the work place and how to legally handle intruders in your office.  This is an actual block of instruction we are not selling and  we do not condone the use of Mace or any chemical agents.  (See pdf Don’ Be a Victim)

  1. HOSTAGE and CHILD RECOVERY


    INTERNATIONAL INTELLIGENCE OPERATIONS
  2. IDRC intelligence analysts, operators and subject matter experts from around the world provide the IDRC Intelligence Operations Center with information necessary for IDRC to fulfill our clients security needs.    IDRC platform monitors early warning signs and indicators to provide our operators and clients with proprietary information needed to successfully protect and secure our clients.  IDRC Operators have successfully contributed and conducted joint operations with foreign law enforcement and intelligence organizations to  assist our clients and enhance the operation and security of their businesses and the protection of principals and their families.

    Comprehensive Physical Security Inspection and Analysis

    Our Standard Analysis will include:

     

    Grounds, and building layout, perimeters, utilities, physical layout, lighting, telecommunications, all points of entry and egress.  ID Badge and Identification Systems, vehicle access, any high points of risk that you may identify, security guard service, security monitoring service, security alarm system, building hardware and key control.

     

    To conduct a comprehensive survey several points that must be identified to us are:

    Location of your check writing equipment, Mail room, Mail reception and sorting areas We will need to know the exact property boundary. 

    A sited plan of a minimum of ground floor or any level that has ground access.  

    We will need to have access to the property and be able to see everything.  We will need an escort and access to the building at night and on weekends as well as business hours.

     Additional Analysis that is available:

     Evaluation of existing response and disaster plan.

     

     Telecommunications Analysis

    Telephone system, facsimile system, inter-comm system, TSCM (Debugging) recommendations, control of access to the communications systems and protection in general.  Commercial Technical Countermeasures conducted will be a radio frequency analysis, telephone analysis, telephone line analysis, carrier current analysis, and a physical search.  The telephones and lines will be analyzed by performing 27 different test.

     Proprietary Information protection

                    Data Security Policy, general information policy and awareness.

     Comprehensive Information Technology Analysis

    This is a survey of your IT program, policy and contingency plans.  Facility will be examined for the presence of unauthorized recording or transmitting equipment.   Report will point out the most common areas that easy compromise could come from and how to stop it.

     

    A basic TSCM inspection involves the following steps:  The visual inspection of the areas and  inspection of the r.f. spectrum and the power circuits in the individual rooms using a TF-8500 receiver, FDL spectrum analyzer, carrier current analyzer, RF Receiver, Frequency counter, electromagnetic pulse detector,  and Spectrum Analyzer.  Establish a listening point outside of your facility  to determine if there are any radio frequency devices transmitting out of your building.

     

    Counter measures are performed by experienced professionals using the industry excepted and certified counter measure equipment and ATAB and ISATP Certified Technicians.

     
    Computer Vulnerability tests.

    Actual hands on testing of your system to determine if your are currently compromised and also to determine if you system can withstand an outside attack from professional hackers.  We will be looking for switches, sniffers, Trojan horses, logic bombs, virus/worms, service denial, login and password compromises and physical invasion.

    HIPPA Compliance Survey

    The Health Insurance Portability and Accountability Act (HIPAA) of 1996 requires the Department of Health and Human Services (HHS) to adopt national standards for electronic health care transactions.

     

    The law also required security and privacy standards in order to protect personal health information.  IDRC has developed a program to audit your compliance with and assist you with the following regulations:

    • Electronic health care transactions (final rule issued);
    • Medical privacy (final rule issued);
    • Security requirements (proposed rule issued; final rule in development);

    Under HIPAA, most health plans, health care clearinghouses and health care providers who engage in certain electronic transactions have only until October 2002 to implement each set of final standards.

    SUMMARY OF EXPERIENCE

IDRC has successfully completed a number of significant security consulting and engineering projects.  These successful projects demonstrate IDRC’s ability to meet design schedules, staffing, estimate costs, and administrate complex consulting, design, turn key security projects.  IDRC’s projects include conducting a complete Vulnerability Assessment of Asset Management for Fortune 500 companies and Overseeing the complete implementation of a new Comprehensive Asset Management Program that has saved clients millions of dollars in losses.  Other projects include the implementation of a muti-million dollar physical security upgrade to an Oil Companies location in Houston Texas; the world wide asset management and executive protection  program for a Middle East Royal family; a detailed armed robbery prevention study for a convenient store chain; a comprehensive physical security and loss prevention study for several computer firms in Ohio, Texas, Georgia, Florida, Michigan, South and North Carolina and New York.; Hostage recovery operations in North and South America, Middle East, and Europe.  Security consulting projects for designing an Information Security and Technical Counter Measures program (De-bugging) for major corporations worldwide; along with a number of other significant projects in the US, Russia, Peru, Germany, and Mexico to name a few.

SEE ATTACHED POWER POINT DOWNLOAD