EESS Capabilities

26
2012-2013 CORPORATE AND PRIVATE ENTITY SOLUTIONS |”FAILURE IS NOT AN OPTION” EAGLE EYE SECURITY SOLUTIONS GLOBAL SECURITY SOLUTIONS AND RISK MITIGATION

description

EESS is a strategic level security and logistics management group comprised of highly experienced professionals that come from diverse backgrounds, ranging from industrial security, to financial services, military special operations and intelligence arenas. All have spent their entire careers dealing with a wide spectrum of threats across the world, be they physical, electronic, political, financial or natural. Our global reach capability and years of exposure to foreign and domestic threats has kept us at the forefront and cutting edge of what we do, continuously searching for innovative methods to improve our abilities to better protect and train our clients’. EESS has a special focus in South and Latin America. EESS serves multi-national companies that have facilities and other business interests in these areas, supporting their global, regional and local security managers in carrying out their strategic security, logistics, plans and goals

Transcript of EESS Capabilities

Page 1: EESS Capabilities

2012-2013

CORPORATE AND PRIVATE ENTITY SOLUTIONS |”FAILURE IS NOT AN OPTION”

EAGLE EYE

SECURITY

SOLUTIONS

GLOBAL SECURITY SOLUTIONS AND RISK

MITIGATION

Page 2: EESS Capabilities

Eagle Eye Security Solutions is a strategic level security management group comprised of highly experienced professionals that come from diverse backgrounds, ranging from industrial security, to financial services, military special operations and intelligence arenas. All have spent their entire careers dealing with a wide spectrum of threats across the world, be they physical, electronic, political, financial or natural. Our global reach capability and years of exposure to foreign and domestic threats has kept us at the forefront and cutting edge of what we do, continuously searching for innovative methods to improve our abilities to better protect our clients’ interests. EESS has a special focus in Latin America, and Africa .EESS serves multi-national companies that have facilities and other business interests in these areas, supporting their global, regional and local security managers in carrying out their strategic security plans and goals. Our comprehensive security programs provide for the safety and security of an organization’s critical assets, be they personnel, merchandise, trade secrets, financial instruments, facilities, reputation or other. This is accomplished by experienced professionals, technology and hardware that, through extensive layers of preventive measures, are designed to reduce the risk exposure of a company from its principal threats; and in case of an emergency, react in an organized and efficient manner to ensure that interruptions to business continuity are reduced as much as possible. The EESS approach to comprehensive asset protection consists of four interdependent activities which form the pillars of any successful security infrastructure: Comprehensive Analysis Programs Plans & Budgets Design Programs Enhancement Implementation Programs Security Program Maintenance

Company Philosophy Of utmost importance is the trust that we develop with our clients. As we

have learned through the years, trust is earned, not bought, and we have earned our trustworthy reputation. All our clients confide on our discretion and have entrusted us with the security of their most prized and critical assets, from family members to proprietary secrets.

The high level of trust that we have developed comes from a foundation of confidentiality and honesty that underpins all our work and operational security.

Furthermore, we always aim is to support the security managers that we work for, with human and technical resources and in concert with the clients’

Page 3: EESS Capabilities

strategic corporate goals, with the finality of creating a synergistic “team” with their security departments, giving them a force multiplier far greater and less expensive than if they tried to hire more staff to do the work in-house.

Finally, we strongly believe in developing strong preventive strategies with our clients, which can turn security into an investment and not an expense. Through preventive strategies, we can help clients develop their long-term projects and budgets in a manner that reduces losses in the long run, demonstrating that the initial layouts will pay for themselves as their projects blossom.

There is no “I” in Team Our group would not be here today...if we didn't understand teamwork. We are team-building specialists skilled in bringing the right individuals and groups together to work as effective, cohesive units. Over the years EESS has developed an extensive network throughout the Globe of trusted and qualified professionals and authorities that can be pulled together in different collaborative efforts to provide a high quality solution to almost any security or loss issue that a company or individual may encounter. With our strong U.S.-based support network through our strategic allies, we are capable of offering and handling a much more extensive and professional spectrum of security services throughout the World. Our success is owed to our strategic alliances that we have fomented over the years, on both sides of the border, allowing us to offer synergistic integrated solutions.

Page 4: EESS Capabilities

SERVICES AND CAPABILITIES STRATEGIC SECURITY ENHANCEMENT PROGRAMS FOR CSOs (Corporate Security Officers) Our comprehensive strategic security programs are designed to support CSOs in their efforts improve the safety and security of an organization’s critical assets, be they personnel, merchandise, trade secrets, financial instruments, facilities, reputation or other. This is accomplished by experienced professionals, technology and hardware that, through extensive layers of preventive measures, are designed to reduce the risk exposure of a company from its principal threats; and in case of an emergency, react in an organized and efficient manner to ensure that interruptions to business continuity are reduced as much as possible. The EESS approach to comprehensive asset protection consists of four interdependent activities which form the pillars of any successful security infrastructure: Comprehensive Analysis Programs Plans & Budgets Design Programs Enhancement Implementation Programs Security Program Maintenance

COMPREHENSIVE ANALYSIS Our comprehensive analysis programs are meant to get an in-depth understanding of the client’s security needs and goals, as well as the state of their current security infrastructure, for the purpose of determining whether further security measures are necessary to meet their corporate security strategy. This involves carrying out a series of interrelated studies, as described below. Comprehensive Security Diagnosis

o Identification of Critical Assets o Development of Threat and Loss Event Models o Vulnerability Assessment o Impact and Criticality Calculations o Risk Determinations o Report and Recommendations

After the Critical Assets have been identified to us by the client, whether they are personnel, facilities, products, resources or information, we then conduct a threat analysis based on information obtained from the client and from our subsequent investigations of the potential threats. From our in-depth research of these potential threats, we can develop specific threat models which will give us a better idea as to how these specific threats could affect the organization, hence allowing us to develop accurate and comprehensive loss event models. With these loss event models in place, we can then examine how well the existing safeguards and procedures will hold up against these specific threats and losses. This is the

Page 5: EESS Capabilities

vulnerability assessment, which is achieved by performing inspections, audits, penetration surveys and other procedures that probe and study the existing security infrastructure. As vulnerabilities are identified, then loss event criticality factors can be determined, which calculates the impact of a specific loss event to the business. Highly probable loss events may not require countermeasures attention if the net damage they would produce is small. But moderately probable risks require attention if the size of the loss they produce could be greater than the acceptable levels for losses. At this point we take all the information that has been gathered and bring it all together to provide a variety of different intelligence reports that will allow the client to get a better understanding of the status of their current security apparatus, as pertains to current threats. It is important to make note that risk analysis projects do not deliver decisions, but rather information that allows the client to make better decisions. This stage is where the client starts seeing how all the previous work comes together to provide relevant and practical information that can be used for different purposes. Aside from written reports that specify the results of all the previous steps (relevant threats identified, threat models formulated, vulnerabilities detected), there are a number of matrix/graphs/charts that can be developed which greatly assist in demonstrating the “big picture”, which is what senior management really needs…the 30,000 foot view, rather than getting lost in the little details (the details are very useful further on in this process when it’s time to design the plans & budgets for enhancement projects). Below is a general flowchart of how this diagnosis process flows. Once the final reports have been delivered, then we are ready to work with the client in designing the subsequent projects that will be critical in reducing vulnerabilities and risk to an acceptable level (see Plans & Budgets Design Programs). SECURITY PROGRAM MAINTENANCE After the necessary solutions have been implemented, a team of supervisors may remain on-site for a period of time to ensure that these implementations are being assimilated properly by the client’s organization and to provide the necessary training to reach the project goals. Training is a major component in keeping a security program well maintained and should be carried out on a periodic basis so that the material stays fresh in the minds of those that need it (see Training Programs). Another major component is the analysis of whether the implemented measures reached the risk reduction expectations or not. We would recommend periodic inspections by our assessment team, which can be scheduled at irregular intervals and can be performed on an un-announced basis so that the organization’s security apparatus can be tested with realistic circumstances. From these assessments, further recommendations can be developed on how to fine tune and debug any imperfections that have persisted in the system.

Page 6: EESS Capabilities

No security program is invulnerable to time and the ever-changing dynamics of its threats. And although maintenance (whether physical equipment maintenance or through training and debugging) can extend the life of many security programs and systems, there comes a time when these become outdated and obsolete. The danger arises when company management fails to recognize this on time and does not have any replacement plans in the works, leaving the company and its critical assets exposed to elevated risks. A periodic maintenance assessment would help keep company managers informed on how their systems are working against new technological and threat model advancements, giving them the forewarning of when it’s time to start planning for replacement systems. AUGMENTED ANALYSIS AND DUE DILIGENCE (AADD) Effective risk management starts with knowing who you’re dealing with. This is particularly important in foreign and frontier markets. It is imperative that organizations understand fully the background and risks associated with their international and domestic clients, business partners, distributors, suppliers, agents, consultants – in fact anyone with whom you are doing business with – before deciding on an offshore deal, business association or foreign investment. But foreign and domestic risk does not end here. In addition to learning all that you can about foreign entities involved, one must also understand fully the environment in which your business ventures will take place. Your new foreign and domestic business partners might have the best intentions and skills, but if the country is in danger of failing or being taken over by a leftist regime with an eye for expropriating foreign businesses, then you need to have the full picture so you can make intelligent decisions. EESS provides discreet due diligence and risk analysis reports for all markets, whether they be in developed or emerging countries. Using state of the art technology as well as seasoned investigators, we know exactly where to obtain all that hidden information that could mean the difference between success and failure. Once all the potential threats, impacts and risks have been identified, then we work with our clients in determining how to deal with them. All risk can be dealt with, in one way or another, either by avoiding, reducing, spreading, transferring or accepting it; but only with the proper insight can one properly develop a successful asset management plan. INTEGRATED PROTECTION SERVICES We have been providing facility and key personnel protection services throughout the world for over 15 years. Every protection project is tailored to the needs of the

Page 7: EESS Capabilities

client. In order to properly evaluate the necessary protective measures, we must first perform a thorough threat and vulnerabilities assessment. The result is a properly tailored protection program that meets the clients’ needs without exceeding budget constraints, while addressing detected vulnerabilities. Implementations can range from fixed site uniformed security guards, to fully developed Personal Security Details (PSDs). When dealing with executive protection programs, we place a great deal of emphasis in preventive security measures. Our comprehensive preventive protection security programs include a combination of many overlapping disciplines and as such, the more layers that are implemented, the better the programs will work. Preventive preparation work

o Background investigations on all relevant personnel, from work to home services.

o Comprehensive route analysis and vulnerability determinations. o Analysis of routines, for the executive and family. o Reconfiguration of routes and routines. o Crisis management response development, at home and at work. o Information security measures and training, from Technical

Surveillance Counter-Measures to trash disposal. o Personal security training for the executives and their families.

Site security force o Risk and vulnerability analysis of site, determination of guard force

needs. o Analysis and training of current security force. o Revamp of current guard force policies, objectives and procedures. o Assist client in changing security guard force, develop bid criteria,

perform due diligence and evaluate candidates. o Assist client in developing proprietary guard force, including

background screening, operations manuals development and training. Personal Security Details

o Host country security specialists, fully licensed, vetted and trained by us.

o International security specialists for high level threat regions, all former Special Forces operators from the U.S., Britain and other allied countries.

o Wide variety of vehicles available, including armored at different levels, depending on threat level determinations.

o Counter-surveillance specialists that sweep critical areas continuously along traveled routes, at home and at work, which is one of the most efficient measures to avoid an incident.

Command, Control and Communications o C3 headquarters and functions can be established at the client’s

desired location or from our own center, utilizing GPS tracking systems, as well as several layers of communications, allowing for

Page 8: EESS Capabilities

proper surveillance and other control functions, including rapid response and emergency protocols.

Intelligence o Our 24/7 Threat Analysis Intelligence Platform continually supports

any ongoing operations in the field, feeding them pertinent intelligence on any changing threat developments in their theater.

Emergency Response and Crisis Management o Emergency evacuations and rescues. o Crisis management preparation and planning.

EXECUTIVE PROTECTION AND TRAVEL LOGISTICS Protective Operations The protection of an individual is comprehensive and goes well beyond surrounding the individual with agents. As part of the Eagle Eye mission of preventing an incident before it occurs, the details rely on meticulous advance work and threat assessments developed by its Intelligence Division to identify potential risks to the principals. Advances in technology and the world's reliance on interdependent network systems also have changed Eagle Eye’s protective responsibilities. No longer can law enforcement rely solely on human resources and physical barriers in designing a security plan; details also must address the role and inherent vulnerabilities of critical infrastructures upon which security plans are built. Advance and Logistics In general, for protective details, teams of Eagle Eye personnel travel in advance and conduct site surveys, which assess needs for manpower, equipment, hospitals and evacuation routes for emergencies. Fire, rescue and other public service personnel in the community are alerted on a need to know basis. Before a detail arrives at any site, a lead advance agent briefs his team in any intelligence information that is pertinent to the movement and ensures all emergency options are outlined. Prior to the arrival of the principals, checkpoints are established and access to the secured area is limited. Because host military, federal, state, county and local law enforcement, as well as public safety organizations are usually not trustworthy in high risk environments it is paramount that Eagle Eye do everything in their power to not need their services. The only way this could be possible is if we plan, de-conflict and minimize all surprises before and during our mission. An Eagle Eye

Page 9: EESS Capabilities

command post acts as the communication center for protective activities, monitors emergencies and keeps all participants in contact with one another. After the mission, agents analyze every step of the protective operation, record unusual incidents and suggest improvements for the future. Protective Research Threat analysis protective research is an integral component of all security operations. Agents and specialists assigned to conduct protective research evaluate information received from law enforcement, intelligence agencies and a variety of other sources regarding individuals or groups who may pose a threat to Eagle Eye clients. Confidential and low signature Although a strong security display is recommended in some war-torn areas, in most cases it is better to maintain a low profile and non-descript presence. Private executive protection does not have the resources of a government security detail (to blockade roads, evacuate sites, etc.), nor does it have the influence (or desire) to draw support from host countries’ government sources. This has led to a philosophy of strong preventive preparation and maintaining a low profile to avoid popping up on the enemy’s radar at all. With this type of low signature security posture, a small but well trained and equipped executive protection team can provide the necessary protective function to deal with the lower risk threats such as random street crime. TRAVEL RISK MANAGEMENT PROGRAMS Objective To mitigate travel risk to an acceptable level consistent with business objectives, regulations and standard of care within the industry. Goals Employees that travel on behalf of their company face greater risks than any other staff member simply because they often visit environments that are different from the norm. Preparing them to better cope with incidents - crime, accidents and natural disasters, will save companies significant time and money in the future. A successful program will: Reduce costs associated with incident response, liability and lost

productivity Reduce the frequency and severity of incidents Require collaboration between relevant departments Result in a culture of informed and prepared travelers Translate into competitive advantage for the organization

Legal Responsibilities

Page 10: EESS Capabilities

Many organizations are operating across borders without fully understanding the risks and duty of care obligations to their travelling populations. Too many organizations wait for a serious incident to occur before they invest in a comprehensive travel risk management solution. This reactive approach has serious ethical, financial and reputational consequences. Services 1) Pre-travel preparations

a) Strategic planning, team building b) Policies & Procedures development c) Crisis Management plan development d) Training e) Intelligence gathering and analysis development f) Contractor due diligence

2) Travel preparations a) Travel plan development b) Site analysis, threat and vulnerability assessments, risk exposure

determination c) Risk mitigation and security needs proposals d) Information security e) Training

3) Travel operations a) Security component project and logistics management b) Forward team, route analysis, site studies c) Field security element: PSDs, counter-surveillance, fixed site d) Technical Surveillance Countermeasures e) Liaison with local authorities

FACILITY LOSS PREVENTION PROGRAMS Internal theft is and has always been one of the key loss events for most companies, especially when dealing with plants and/or warehouses in emerging countries. The development of a comprehensive loss prevention program is one of the most fundamental security programs that needs to be established in any company. As with all aspects of security, significant loss prevention can be achieved only through the implementation of many different but complementing security layers. Below is a sampling of some of the more important layers that should be considered in the development of a comprehensive loss prevention program, but in order for an organization to better understand the status of their security infrastructure, we recommend our Comprehensive Analysis Programs. The results of this diagnosis will give the client a better idea as to where the greatest vulnerabilities exist and where to invest their money to get the greatest “bang for their buck”.

Page 11: EESS Capabilities

Human Resources Crime is committed by people, but people are needed to run a company, so by definition there is no way of eliminating this risk, so the first and most important risk reduction measure is to hire the best and most honest people possible. Having said all this, it is easier said than done. This is why a strong Human Resources employee screening and background investigations program is one of the most important measures to reducing internal theft. Thorough background investigations, as well as lifestyle and personality studies and even the application of the polygraph or other “truth detection” devises, are key components to improving the quality of new employees. Employee Satisfaction Although not strictly a security manager’s area of responsibility, there are areas where we can assist a client in helping them build a more employee-friendly environment, such as the development of an Employee Assistance Program (EAP). Policies and Procedures Development Before large sums of money are spent on sophisticated security equipment and personnel, much vulnerability can be eliminated or greatly reduced through simple but effective security-conscious policies and procedures. Different business functions throughout the company should have their policies and procedures analyzed and revamped (see Policy and Procedural Development) to integrate security measures that will take away the opportunity from someone who has already found the motive and rational to do harm to the company. Training It is a well known fact that much of the theft in a company is due to employee carelessness, distraction and error. To counter this, employee security awareness training has become a key component of an effective loss prevention strategy. It is also important to train employees on new policies and procedures (or refresh their memories on old ones), which serves not only to reinforce the security measures, but also to meet compliance goals, as well as to provide the precedent necessary in case legal action is required in the future against a suspect employee. Internal Investigations An effective internal investigations program should have a wide range of investigative tools at its disposal, such as assisting the HR department with background and personality investigations; carrying out covert surveillance of suspect areas and personnel; the development of an internal intelligence network, through the establishment of an anonymous reporting mechanism (hotline, email), recruitment of informants, exit interviews of outgoing employees and undercover operations. The development of a sophisticated and effective intelligence apparatus not only allows for the company to initiate legal measures against the perpetrators, but will also help in identifying undetected vulnerabilities, allowing the company to develop proper countermeasures to ensure that other employees cannot take

Page 12: EESS Capabilities

advantage of that opportunity anymore. Furthermore, these actions will provide a strong deterrent to other employees that might be contemplating a crime or are already in the process of carrying it out. Physical Security The design of a company’s vehicle and pedestrian flow and control can play an important role in establishing an effective loss prevention program. A physical security infrastructure has 4 principal goals. The first is to Deter a good portion of criminal perpetrators just by the mere presence of displayed security. For those that are not easily deterred and will attempt to perpetrate a crime against the company in spite of established security, then the security infrastructure will serve to either completely Deny entry/exit, or if the assailant is skilled enough, will at least Delay their actions. For those determined and skilled enough to get in or out illegally, then the last goal of physical security is to be able to Detect the assailant, preferably with enough time to call the police and/or take other protective measures. Physical security is achieved through layers of complementing systems, such as fencing, barriers, signs, doors, windows, gates, locks, electronic access control, security cameras, alarm systems and security guards. Each facility has its own peculiarities, needs and goals, so Comprehensive Analysis Programs will be necessary to better understand the status of the facility’s physical security infrastructure and determine what is still needed to get it to where it should be. Shipping and Transportation Cargo transportation theft is a major threat that many companies have to deal with in Mexico. We have over 15 years working closely with major multi-national companies in Mexico with the development of comprehensive cargo transportation security programs. Some clients have reached such a high level of loss reduction that their savings have surpassed their security costs. Below we have outlined some measures that can be implemented, but depending on the client’s particulars, not all may apply. Every organization has its particular features that will require us to sit down with the client to develop a tailor-made program. 1) Preventive measures

a) Initial Risk Analysis and Vulnerability Assessment i) Intelligence gathering and analysis / threat determinations

b) Protection escort force development (auxiliary police, private, or internal) i) Selection, screening ii) Equipping and Training iii) Operations and supervision iv) Intelligence support

c) Vehicle tracking measures

Page 13: EESS Capabilities

d) Transportation provider Due Diligence

e) Distribution company Due Diligence

f) Plant/distribution center g) Policies, procedures, controls h) Undercover Operations i) Information security j) Legal considerations

2) Reactive measures a) Incident investigations

i) Discover criminal elements (especially within company)

ii) Learn their SOP and company vulnerabilities iii) Establish policy of going after the criminals

3) Selling the program a) A program this comprehensive represents a strong up-front investment for a

company. EESS will work with security managers to properly research and design the proposals to demonstrate that the investment will be pay for itself in the long-run through substantial reduction in losses to the company.

POLICY AND PROCEDURAL DEVELOPMENT The most effective security programs are those that are based on preventive strategies and infrastructures, rather than waiting for the problem to occur and then taking corrective measures. Nevertheless, setting up a comprehensive and integrated preventive infrastructure takes meticulous planning and implementation, as well as the foresight and understanding that it takes a good initial investment to set things up and that the benefits are reaped in the long run, as losses are prevented. The most fundamental layer of preventive security that any company should have is the interweaving of security measures into existing policies and procedures throughout the company. EESS security experts work side-by-side with our clients in designing, developing and implementing tailor-made policy and procedural development programs, but in order to understand the starting point, we must first start with a thorough assessment of the current security infrastructure and vulnerabilities (see Comprehensive Analysis Programs). Once we have a solid understanding of the client’s existing security status, then we work on risk abatement measures through policy design and procedural development, implementation and training. Programs that we have been involved with in developing our client’s operations manuals include: Crisis Management and Business Continuity

Page 14: EESS Capabilities

Executive Protection / Family Security Security Guards (fixed installation, cargo transport escorts, etc.) Loss Prevention Employee Security Awareness and Compliance Information Security Investigations & Intelligence Background Investigations (Employees, sales representatives) Due Diligence (purchasing, suppliers, contractors, mergers, acquisitions) Safety Other business functions that are often vulnerable to loss, especially through

internal participation: o Cashier o Accounting payables, receivables, payroll o Human resources (claims, benefits, insurance) o Purchasing and receiving o Information processing systems o Travel (see Travel Risk Management Programs) o Transportation o Returned goods or merchandise o Salvage, scrap, rejected product o Warranty administration o General insurance o Real estate (acquisition and management) o Fixed asset accounting o Tools and maintenance material issue o Advertising o Employee store o Food service operations

CRISIS MANAGEMENT SERVICES Even with a strong preventive security program, it would also be unrealistic to think that there will never be an emergency that the company and its personnel will have to handle quickly and efficiently, with minimal effect on productivity. EESS’s Crisis Management and Business Continuity Programs begin by assisting clients in developing and implementing the necessary policies and procedures on how to plan for and respond to various emergency situations. The Corporate Crisis Management plan includes the identification of key personnel and procedures to be used in responding to a crisis. Specific threshold levels are identified and responsibilities of the corporate officials delineated. Provisions are made for periodic reviews of the corporate crisis management plan. Through our Policy and Procedural Development programs, EESS can work with senior management and the crisis management team in developing comprehensive emergency response plans.

Page 15: EESS Capabilities

Crisis training and simulations (such as our Kidnap and Ransom Crisis Management Preparation and Simulation Course) are an essential part of communicating the plan, testing its effectiveness and improving the details. In addition to manuals development, some emergencies will require specialty support, such as kidnap negotiations or emergency extractions from hostile regions. Some of the emergencies that we have supported in either the plan development, response and/or training, are: Emergency protection details and extractions Medical Emergencies / international evacuations K&R / Extortion Crisis Consulting and Training Service Bomb Threats / Explosions Key Personnel Loss (death, sickness, disappearance) Political / Social / economic upheaval War / revolution / terrorism Natural Disasters (earthquakes, hurricanes, floods) Organized Crime (employee infiltration, shipping narcotics) Intellectual Property Violations (massive product recalls) Critical Information Loss (electronic data breach, industrial espionage) Critical Asset Loss (trade secret, extinction level theft)

KIDNAP & RANSOM / EXTORTION CRISIS CONSULTING If it happened today, is your company ready to handle the kidnapping of one

of your key executives? Is your crisis management plan and team fully developed and trained for this

kind of incident? Has senior management laid out key strategic policy decisions to guide the

Crisis Management Team so that they can react quickly and efficiently? When a family member receives that highly-charged first call, will they know

what to do and what not to do? Who should they contact first? How should they respond to the caller?

Would you know what to do to improve your chances of survival if you were

kidnapped today? These are some of the many critical issues that arise during a kidnapping crisis. Although it is imperative to bring in a professional to facilitate a positive resolution to the crisis, there are practical steps that can be taken to properly plan for such an event. By preparing before anything ever happens, a system of responses can be developed from the top-down to mitigate devastating consequences, giving you the game plan and tools to react in a quick and efficient manner.

Page 16: EESS Capabilities

Our integrated services for preparing and responding to kidnappings or extortions include: Crisis management planning

o Strategic consulting & policy development o Crisis Management Plan development

Crisis response consulting o Kidnap and Ransom (K&R) and extortion consulting o Liaison with authorities (where appropriate) o Investigations o Asset recovery o Rescue operations

Full gamut of training, from quick corporate and family briefings, all the way to realistic incident simulation exercises that are meant to stress test the Crisis Management Plan

K&R insurance consulting and brokering

With the addition of these new services to our well established training programs in kidnap avoidance and self protection, as well as our high-end PSD teams, EESS provides one of the best high-end all-in-one-stop shops for protecting your key personnel. INVESTIGATIONS AND INTELLIGENCE Investigations are a very important tool for preventing lo sses, as well as resolving critical incidents and dissuading further criminal activity against your assets. EESS Offers a wide range of investigative capabilities, to include: Employee screening (background, lifestyle) Due Diligence (clients, suppliers, contractors, investors, investments,

acquisitions, mergers) Intellectual property crimes (counterfeiting, diversion, parallel imports,

Patent/trademark infringement) Economic crimes (embezzlement, kick-backs, corruption, money laundering) Employee fraud (false claims, document falsifications, forgery)

Page 17: EESS Capabilities

Theft / robbery / pilferage (office, plant, warehouse, transport) Employee misconduct / workplace violence Threat / Extortion / Sabotage Competitive Intelligence Counter-intelligence/TSCM Undercover Operations / infiltrations Union / labor conflicts Kidnap / homicide Traffic accident E-crime / data breaches Compliance / preventive

Developing Sustainable Investigative Programs Although specific isolated investigations can provide useful information that produce immediate results, these results can be short-term and short-lived if the information is not incorporated into a larger intelligence effort. Since 1995 we have developed a wide variety of information sources in Mexico, from hundreds of field investigations, to public sources, to

nationwide networks of cooperating individuals, ranging from upper echelon governmental ranks all the way down to the underworld. This has allowed us to develop a substantial in-house intelligence database, containing a wide range of information on criminal activity in Mexico. With the use of special intelligence analysis programs (such as i2), this data base is a force multiplier during our investigations. When tasked with a specific investigation, we always start by querying our database first, looking for relevant intelligence that may apply to the current case. In more than a few occasions it turned out that we already had some important information that allowed us to obtain more comprehensive results. Through years of experience we have developed an Investigation & Intelligence Cycle that has worked successfully and which we apply to all of our investigations. It starts with the client, where we review the problem and establish mission objectives, parameters, resources available and other details necessary to develop the investigative plan and budget. Once the plan is finalized and approved, field operations are initiated, intelligence and evidence is collected, analyzed and disseminated with the client. At this point in the cycle, changes or corrections in the plan are often necessary as new information comes into play. With the modified plan in place, operations are initiated again and the cycle repeats; restructuring and

Page 18: EESS Capabilities

repeating as needed until the client is satisfied that all the key objectives have been achieved. We usually work closely with the client’s legal department so that our objectives and operations are in-line with the company’s legal framework and proceedings. Furthermore, our close relationship with federal, state and local authorities throughout the country has allowed us and our clients to make the most of our investigations. With our intelligence product and the client’s legal proceedings, the authorities have carried out dozens of successful arrests as well as search and seizure operations over the years. We have a long list of satisfied fortune 500 customers and have been instrumental in bringing down a wide range of criminal perpetrators, from solo actors to large criminal organizations involved in counterfeiting, highway truck theft, narco-trafficking, kidnapping and extortion in Mexico. EMERGENCY RESPONSE SERVICES Disasters or emergencies can happen suddenly, creating a situation in which the normal staff support services for the organization can become overwhelmed. During crises, the organization requires special programs to address the needs of emergency response operations and recovery management. To address such emergencies, EESS has established emergency response procedures, that provide guidelines for the management of the immediate actions and operations required to respond to an emergency or disaster. The overall priorities of the plant during a disaster are the protection of lives, trade secrets, property, the community, and the environment. The overall objective is to respond to emergency conditions and manage the crisis, whether that be the restoration of business continuity, or the total evacuation of personnel and key assets. Emergency Security Evacuations In today’s volatile world, an organization with a facility in a once stable region can suddenly find itself in a situation where there is a need to urgently and efficiently evacuate personnel and key assets. With the added difficulty of operating in a newly hostile environment, the security risks can grow exponentially in a very short period of time. EESS can provide integrated emergency support services that can quickly harden the clients’ sites, establishing a protective shell for its personnel and key assets, while at the same time organizing a safe and secure evacuation.

Page 19: EESS Capabilities

All team members have served and operated in High Risk Environments and are highly trained and physically capable. Due to our high operational and training tempo, all members are adept at overcoming any and all logistical, administrative, and tactical hurdles that arise when undertaking Personal Security and Logistical movements in hostile or non-permissive environments. Remote Area Air Charter Services EESS provides a complete cargo charter service, operating aircraft of all sizes ranging from single propeller Cessna to the Antonov 225 – capable of uplifting 250 tons. No matter the scale of your operation, whether it is a single leg trip or a much larger requirement utilizing numerous aircraft to multiple locations, we have the experience to rapidly find the best charter solutions. Our worldwide cargo account managers are experts in all aspects of cargo chartering – including airport slots, traffic rights, ground-air coordination and cargo handling. In addition to flying passengers into disaster areas, EESS also has experience in mass evacuations, requiring multiple aircraft to move survivors out of affected areas rapidly. There are many types of emergency situations where relief flights provide a very real solution:

• Famines • Civil wars • Natural disasters • Sieges • Reconstruction

Page 20: EESS Capabilities

Working alongside governments, relief organizations and NGO’s, the air charter industry can help to play an important role in alleviating the suffering of victims of these events. The response is fast, flexible and effective. EESS’s position in providing humanitarian aid charters is proved by our long standing relationships with major aid organizations worldwide. At EESS we are proud to have participated in this field and gained the reputation as the industry experts. Logistics into remote Areas: We can organize fixed or rotary wing aircraft for charter on an ad hoc basis or more extensive charter programs, for both passengers and cargo, to:

• Remote locations with no scheduled services. • War affected countries • Regions of political instability • Oil Fields • Natural disaster zones • Countries hit by strikes • Locations with inadequate infrastructure & airports • Locations requiring air drops

Medical Evacuation: Whether your company or personnel operate in a remote location, contend in a hazardous industry or just require a contingency plan for travelling staff members, EESS is here to provide these services for you. If you are in the business of insurance and require a reliable and experienced air ambulance supplier, EESS already services the top names in the industry, and has the experience and the contacts to help you deliver your promises.

• Long range ambulance jets fitted with a full ICU (intensive care unit) capacity • Onboard medical teams • Ability to source specialist medical help should it be required • Adapted aircraft, suitable for minor injury patients required to lie flat or fly

at a designated air pressure level • Cargo doors to upload stretchers • Helicopter transfers to and from jets can be arranged

EESS provides a highly professional medical transport service, and with our worldwide network of offices we can provide a number of solutions in the least amount of time. You can rest assured that EESS will provide the best care and attention possible to each and every patient carried on board our medical evacuation charters. TRAINING PROGRAMS EESS provides training programs specifically designed to meet the special needs of the client, whether government, corporate or private. A careful analysis of specific

Page 21: EESS Capabilities

performance requirements, financial resources and the geo-cultural environment is considered in developing comprehensive, individually tailored training programs. We emphasize and develop the application of skills through the use of hands-on training in the real-world environment of the client, combining lecture, workshops and field exercises that confront and deal with the special challenges posed by the geographical, social and political environment of the client’s Area of Operations. A sample of the courses that we offer: Courses for executives

o Counter-kidnapping/crime avoidance/situational awareness o Defensive and evasive driving o Advance leadership o Being a victim o First aide o Basic firearms and hand-to-hand

Executive Protection personnel training o Counter-kidnapping/crime avoidance/situational awareness o Defensive and evasive driving o Advanced firearms and hand-to-hand o Motorcade o Counter-surveillance o Combat medicine

Courses for all employees o Situational awareness/crime avoidance o Loss prevention o Workplace violence

Crisis Management planning, training and simulations o Kidnap and Ransom Crisis Management Preparation and Simulation

Course o Bomb threat / evacuations o Industrial incident / evacuations o Fire incident / fire brigades / evacuations o Workplace violence o Medical emergency o No-notice simulations (there are important liability issues that need

to be considered here before undertaking this sort of exercise) CSO (Corporate Security Officer) Training

o Crisis management o Investigations o Personnel security o Physical security o Information security o Legal and compliance o Security principles and practices

Page 22: EESS Capabilities

o Business principles and practices Guard force training programs Information Security Training Human Resources in efficient recruiting and screening practices

COUNTER KIDNAP & CRIME AVOIDANCE TRAINING Theory and exercises covered

Situational awareness Route Analysis Surveillance Detection Surveillance Detection Routes (SDR) Countering the Surprise Anatomy of Extortion and Mitigation Techniques Crisis Response and Management Biographical Data Sheet Personal Security Vulnerability Assessment

Self Defense If you live in a high-crime area, you likely recognize the importance of being aware of your surrounding and knowing how to protect yourself. However, crimes against women and men can occur in any area, including neighborhoods with a reputation for being quiet and safe. There are many reasons why people should learn self-defense techniques. Sexual predators and other sick persons know how to sneak up on their victims. They usually attack when the victim is preoccupied, such a talking on the cell phone, bringing groceries into the home, or trying to unlock a door. For this matter, women should be alert to their surroundings, and learn skills to ensure their survival. Exercises and Objectives

Anatomy of a Strike Level I,II,III Striking Techniques Stance Threat Assessment Multiple Attackers Knife Attacks-Last Option Gun Attacks-Last Option Fight for your life-Ground

DEFENSIVE AND EVASIVE DRIVING COURSE The initial driving brief is presented in a classroom setting and culminates with practical driving exercises giving students the opportunity to practice and demonstrate their level of understanding and ability to apply the concepts and skills

Page 23: EESS Capabilities

taught. Throughout the day the student will practice high speed chases, ramming, and in turn learn to maintain control of the vehicle while making effective driving decisions in aggressive, hostile and congested traffic similar to what they might experience in other regions of the world. Class Room and Exercise: •High Speed Driving •Attack Recognition and Response •ABS vs. Non-Abs •Thresh Hold breaking •Crash Avoidance •Evasive Actions •Instinctive Driving •Line of Sight •Over-Steer •Sensory overload •Shuffle Steering Practical Exercises: •Slalom Forward-Reverse •Breaking-Thresh Hold-ABS •Dumping Speed •Rubbing-Laterally •Chase the Rabbit-CQ •Driving From Passenger •Man down Transfer-1 and 2 passengers •Identifying Vehicular –Foot threats •Egress to Vehicle-Fight to Vehicle •Reacting to threats •J-turns •Pits •Fight to Chase KIDNAP AND RANSOM CRISIS MANAGEMENT PREPARATION AND SIMULATION COURSE If it happened today, is your company ready to handle the kidnapping of one

of your key executives? Is your crisis management plan and team fully developed and trained for this

kind of incident? Has senior management laid out key strategic policy decisions to guide the

Crisis Management Team so that they can react quickly and efficiently?

Page 24: EESS Capabilities

When a family member receives that highly-charged first call, will they know

what to do and what not to do? Who should they contact first? How should they respond to the caller?

Would you know what to do to improve your chances of survival if you were

kidnapped today? These are some of the many critical issues that arise during a kidnapping crisis. Although it is imperative to bring in a professional to facilitate a positive resolution to the crisis, there are practical steps that can be taken to properly plan for such an event. By preparing before anything ever happens, a system of responses can be developed from the top-down to potentially mitigate devastating consequences. EESS has developed an intense and powerful course that will give companies and families important skills and tools to help them better prepare for, and if necessary, deal with this terrible occurrence. This is a one day course that is broken down into four sections. We start with a security briefing which provides a good overview of related issues and which also helps to get everyone on the same level, as some participants might not have had any or much previous training in this area.

1. Security Briefing a) How kidnappers work b) How not to be an easy target c) How to survive being a victim

Next, we go into the preparation and development of a crisis management plan, focusing on how to apply these principles to the kidnapping crisis.

2. Crisis Management preparations a) Pre-incident planning b) Assign accountability c) Perform Risk, Vulnerability and Impact Assessments d) Define Strategic Objectives & Policies e) Develop the Crisis Management Plan f) Communicate plan g) Maintain the plan current

This leads us into the kidnap and ransom simulation, where we divide the participants into several work groups, feeding them information little by little as the crisis unfolds and evolves, forcing the participants to make critical decisions, then evaluating their decisions and describing the possible outcomes (negative and positive) of their decisions, culminating with the resolution of the crisis.

Page 25: EESS Capabilities

3. K&R Simulation a) Introduction of the players b) Situation and area kidnap occurs c) Information received d) How the corporation responds e) Who is notified f) Potential problem introduced g) Team development and

resolution Finally, we wrap the day up with a look at recovering from this type of crisis, both as a company and as a family.

4. Recovery and Resumption a) Damage/impact assessment b) Resumption of critical and remaining operations c) Return to normal operations d) Recovery of victims and families

At the end of this course, the participants will have experienced a full K&R situation, from beginning to end, giving them some real world experience that they can take back to their companies and families so that they can initiate the process of preparation and risk mitigation. In the event of a kidnapping, they will be able to efficiently respond to the crisis in the first critical hours until the experienced K&R negotiator arrives. EXECUTIVE PROTECTION MEDICAL TRAINING There should be continuous, ongoing training in emergency care training programs covering first aid, CPR, AED and emergency oxygen. The EPU should carry a full array of first-aid equipment, including a defibrillator within the executive vehicle at all times. This course will teach the student the basics they need to know in order to assist and possibly save the lives of one of their own. Exposure to the dynamics of treating injuries that can be expected from an attack on a principal, including methodology to be used in the event that the protective team is still engaged in a confrontation when the need arises to provide first responder support to their principal or other teammates. Training begins with familiarization of basic First Aid treatments, Adult Cardio-Pulmonary Resuscitation and Automated External Defibrillators and culminates in practical exercises that start with simulated drills and include providing the first responder medical support as required by the scenario.

Page 26: EESS Capabilities

ARMORED VEHICLE RENTAL AND SALES With a worldwide network of businesses and multi-national workforce, EESS is well positioned to satisfy the growing demand for its solutions and services of armored vehicles, security cars, bullet proof vehicle and other light weight security vehicles. The country, the political situation and the position of each client determine the danger potentials. They match their predefined armoring types to your specific exposure risks based on our assessment of your needs. People whose personal safety is threatened usually have a prominent position in government, society or industry. Armored security vehicles do more than satisfy the demands that a position of this kind makes in regard to safety and comfort. That is why they don't build on any base vehicle model. EESS vehicles must meet high standards in regard to automotive technology, performance and comfort right from the start. And none of these features can be diminished once the armoring is installed. For this reason, they restrict themselves to selected models produced by well known manufacturers.