travel safety for the global employee - pzi consulting · travel safety for the global employee ....

41
Travel Safety for the Global Employee

Upload: ngonhi

Post on 16-Feb-2019

215 views

Category:

Documents


0 download

TRANSCRIPT

Travel Safety for the Global Employee

About Us

GROM Technologies, Inc. is located in Clearwater, Florida with satellite office

in Washington, D.C. We specialize in boutique, full spectrum, geo-spatial

accountability, and rapid response personnel recovery in support to global

disasters.

GROM is differentiated by skilled management; which marshal diverse and

multifold resources to inspire innovative solutions for unique and extremely

complex tasks.

Our companies key strength is finding and applying cost effective cutting

edge technology that meets our client’s requirements; while working in an

environment that is extremely fluid and dynamic with ever evolving mission

priorities.

GROM has a unique blend of university academia, leading edge technology,

proven vendor performance, and client satisfaction. We also have in depth

expertise in Special Operations activities, integrated threat management,

and defense contracting.

GROM has applied for woman owned company status.

Global Travel Realities

Global movement of people, goods, and ideas has expanded significantly in the past decade that have led to dramatic increases in the following areas:

– Increased global leisure activity

– Educational institutions sending more faculty and students abroad to teach and learn

– Religious non-profit organizations reaching across the globe to support those in need

As the economy continues to exit a global recession, corporations are putting business travelers back on the road

Enhanced traveler safety and security is a top priority for all organizations and families to ensure goals and objectives are realized throughout the traveling experience

“A Globalized society offers a complex web of forces and factors that bring

people, cultures, markets, beliefs and practices into increasingly greater

proximity to one another with increased safety risks that must be clearly

understood by all travelers”

Safe Travel Concerns

Analysts and travel experts agree that security and safety around the world varies -- sometimes dramatically -- from place to place

Some countries, like Mexico are as dangerous as ever, while travel in many countries is as safe as ever, depending on one's destination, actions and common sense

Security professionals agree – pre-trip training and planning is necessary to operate effectively and safely in most locations around the globe

Step 1: Before Travel

Learn about the country they plan to visit

– including local customs, laws and language.

What to pack/carry as you travel

– critical documents like passport.

Best practices for ensuring safety abroad.

What your employees need to do before they leave

the country include:

Personal Security Travel Preparation

Cultural Awareness:

Being an “ugly American” may target you for crime or worse.

"When in Rome, do as the Romans do”

Do your research before you travel:

Lonely Planet guides

US State Department website http://travel.state.gov

Overseas Advisory Security Council www.osac.gov

Step 2: Travel Health Education

Learn about what diseases are prevalent in the area(s) of planned travel.

Make plans to receive appropriate vaccinations before leaving and possibly on return.

Recognize what is safe to eat and drink and what should be avoided.

Health concerns when traveling abroad include:

Step 3: Situational Awareness &

Safety

Learn how to protect yourself

simply by becoming aware of

your surroundings and

noticing when things are not

right.

Learn the five phases of

hostile surveillance and what

you can do to prevent

becoming a victim.

Step 3: Situational Awareness & Safety

Travel Security

Travel Defensively

When Traveling:

CLOTHING

– Travel in conservative civilian clothing that

does not draw attention to your nationality or

status i.e. leave your business suit in your

luggage.

– Don't wear American identified items such as

cowboy hats or boots, baseball caps, American

logo T-shirts, jackets, or sweatshirts.

– Don't wear distinct items such as company

shirts, expensive glasses, flashy watches or

jewelry. Leave your Rolex at home.

– Wear a long-sleeved shirt if you have visible

tattoos.

The goal is to blend in with fellow

travelers. You should strive to fit in the

crowd and not draw attention to

yourself. DON’T MARK YOURSELF

as important like this individual does.

Travel Security

Travel Defensively

Traveling by Air:

At the airport

– Arrive at the airport 3+ hours in advance.

Count on extended lines, long waits and

multiple security screenings.

–As an American passport holder, expect

added scrutiny by custom officials.

– Retain physical control of your personal

carry-on items at all times. Have your

passport and travel documents readily

available at all times.

– Obtain the local currency in advance.

– Set up secure transportation options in

advance. Only take taxis from official stands.

Travel Security

Travel Defensively

Hotel Accommodations:

– Book reservations with major International Hotel chains but avoid

recognized US brands in developing countries or where the threat of

terrorism is high (usually the first targeted).

– Room Selection:

1) Above the second but below the fourth floor.

2) Does not overlook the hotel’s lobby

3) Ideally near the fire exit

REMEMBER: Hotels in developing countries are normally used by the

National intelligence services to obtain information about the traveler. It

does not matter who you are!

From Personal Security Guidelines for the American

Business Traveler Overseas - OSAC Dept of State

Travel Security

Travel Defensively

Hotel Accommodations - Individual Protection Measures (IPMs)

- Do not discuss your business or travel plans with strangers or in public areas

- Always maintain control over your proprietary information

- Never leave your laptop computer in your hotel room

- Never leave your cell phone in your hotel room

- Never leave your valuables in your hotel room, place in safe at front desk if possible

- Avoid using your room safe as it is probably compromised

- Never leave your passport in your hotel room

- Leave the television/radio on when you leave the room

- Strongly recommended you never make a international phone call from your room

- Use your lock whenever inside your hotel room

- Always use peephole if there is a knock on your door

- Maintain a neat room to determine if someone has rummaged through your belongings

- If possible, avoid using a hotel that is exclusively used by Western foreigners; such a hotel has likely been the target of terrorists in the past and will be in the future.

From Personal Security Guidelines for the American

Business Traveler Overseas - OSAC Dept of State

Travel Security

Travel Defensively

Traveling by Auto - Determine from local contacts the best travel options - Work out arrangements to use taxi/drive exclusively if feasible - If driving, always be familiar with host country laws - If driving have proper insurance and know accident procedures - When in your car, always drive with doors locked and windows up - Always practice good security awareness and - Expect the unexpected when stopped at intersections - Be prepared for the Swarm Technique!

From Personal Security Guidelines for the American

Business Traveler Overseas - OSAC Dept of State

Hostile Surveillance Awareness

Targeting Process: Hostile Surveillance usually consists of five distinct

steps, culminating in the actual kidnapping incident outlined below:

1

1) Target Selection: The kidnappers usually assemble a list of more than one potential target

which meets their particular objective;

2

2) Surveillance: Potential targets are placed under surveillance to assess, identify and chose the “softest” target;

3

3) Planning: Details of the attack are finalized;

4) Deployment: Kidnappers will deploy to the selected location for execution of the plan.

4 5

5) Attack: The kidnapping time and location are predicated on the information gathered in

previous steps and must offer an high opportunity for success, or it will not take place.

To be successful, an attack must contain the following three elements:

Cover: Concealment for the kidnappers to stage an ambush.

Control: Ensure the target remains in the ambush zone long enough to kidnap

Escape: Safe escape from the ambush site with multiple exit routes.

Surveillance – How to Detect It

Don’t assume the threat is always behind you or always men. They can be anyone, anywhere. Trust your instincts. Trust your sixth sense and intuition if you notice an individual or group intently watching or following your movements. Indicators of surveillance include:

1) Walking past an individual who then begins to follow you at a distance.

2) Observing someone out of place who doesn’t seem to have a reason for being there.

3) Someone looking at you then quickly looking around as you notice his stare.

4) The same vehicle, make and model, is following you home more than once.

Surveillance – How to deal with it

If your gut tells you that you are being watched or followed, there are passive measures you can take while on foot or while driving. It is important not to bring attention to yourself; attempt to be subtle as you confirm the surveillance. Conceal your suspicion until you have confirmed you are under surveillance.

If walking, circle the block again or retrace your steps. Adjust your pace or pause in a public area where there is a large crowd. Attempt to use the reflection in a window to observe if you are being followed. Change your route suddenly: flag down a taxi or use another form of public transportation.

When driving, alternate your speed and your normal route. Make a U-turn or drive around the block to see if the marked vehicle is still trailing you. Be aware that vehicle surveillance may use several cars, so be on the lookout for more than one suspicious car.

If you confirm the surveillance, don’t be obvious unless you feel danger is imminent. Conceal your suspicion and DO NOT confront your tail. Proceed immediately to a safe area and alert trusted authorities as soon as possible. Try to provide a detailed description of the individual(s)/vehicle(s) and an accurate account of the events leading to the surveillance.

Remember –

Source: Recognizing Trouble Before it Happens

Juan A. Garcia Jr. High Risk Security Services

The rule of thumb for

surveillance sightings:

• Once = suspect

• Twice = possible

• Three = probable

Speak with law

enforcement if you

suspect surveillance

Step 4: Personal Security Measures

Learn how to safeguard

valuables and prevent theft

from pickpockets.

In the unlikely event of an

abduction, learn specific

strategies to increase personal

safety.

Personal Security Measures give your traveler the

insight to further protect themselves from becoming

the target of crime and kidnapping.

HAK

Hostage Abduction Kidnapping

Hostage-Taking, Abduction,

Kidnapping (HAK) Defined

Hostage-taking - Seizing or detention of an individual coupled with a threat to kill, injure or continue to detain such individual in order to compel a third person or governmental organization to take some action.

Abduction - Action or an instance of forcibly taking someone away and incarcerating them against their will.

Kidnapping – taking an individual away illegally by force (abduction), typically to obtain a monetary ransom.

OVERVIEW

Stages of Captivity

Resisting Exploitation

Captivity Recommendations

Escape & Rescue Considerations

Kidnapping Tactics

Military, Security, Diplomats, Journalists

Small + Weak + Unarmed + Isolated = Easy Target

Surveillance

Goal is to overpower by using anesthesia

(injected, inhaled) choke wire, Stun-gun, Mase

Blindfolded, restraints, possible hearing impaired

Transport

Use of disguises, false names, etc.

Distractions

Capture Phase

Time permitting

– Make a distress call, then destroy the communication device

– Hide, destroy, or neutralize equipment and information (e.g.)

• Shipping manifest

– Hide small signaling aids in clothing / on person

– Consume any water and food

Most violent phase, shield / protect yourself

Don’t antagonize

Overcome Shock

– Stay alert but don’t show it

– Be ready for quick decisions

Be “Escape Minded”

Exploitation begins

– My begin shortly after capture & continue.

Movement Phase

The most probable, moved every few hours or days – Political hot potato – Possibly moved from “safe house” to “safe house”

Away from coalition forces/friendly control May be shown off as a “War trophy” – Hostile or curious crowds are possible

Increased chance of interrogation Escape potential still good – Confusion, Distractions – Less Tension – Untrained guards – Unsecured holding facilities

Dedicated Fixed Facility

Possibly far from friendly forces

Better trained guards

Propaganda / Exploitation – May begin shortly after capture & continue

Escape Considerations – Think “escape”

• Who, What, When, Where & How

– Are there Repercussions ? • To those left behind

• For failed attempt

– Cultural / Racial Differences

The Will to Survive

All personnel have a responsibility to resist – What motivates you?

• Family, friends, beliefs, hatred

Strong will and strong posture may reduce the likelihood of future exploitation

“Battle of wills” not a “Battle of wits” – Never believe you are better or more

intelligent than your captors / interrogators

Captivity Recommendations

Humanize yourself

– Human being vs. world oppressor / Great Satan

– Discuss commonalities such as family, religion, sports (examples)

Be respectful and expect, or ask for respect

– Courtesy costs nothing, lack of can become costly.

– Polite & professional, “Sir”

– Control displays of emotion

• Whining or begging is frowned upon, viewed as weakness

Show apparent willingness to listen without engaging in discussion

– Do not pass judgment, praise, pander, participate or debate.

Introducing non-inflammatory topics at critical times (impasses, demands) may reduce tensions

Cautions;

– Appearing arrogant may get you hurt

– Sensitive topics

• Politics, education, sex & religious beliefs

• Avoiding language such as “gun, kill, punish,” etc

Captivity Recommendations

Vital to get your identity and status known

– Get on camera = proof of life or “POL”

Attempt to establish contact with friendly forces and other captives

Communicate with other captives about

– Who is being held, how long have they been held, what has the captor asked for, what are the captor goals / identities.

– Are you being held w/ military or civilians?

Leave evidence of presence – DNA, initials, clothing

Copyright © 2006 Daniel

Risk Mitigation, Inc. All rights

reserved.

Escape

Have been successful

May happen at any time

Always be looking

Defeat restraints

Copyright © 2006 Daniel

Risk Mitigation, Inc. All rights

reserved.

Escape Considerations

Escape is risky but may become necessary

Be escape minded at all times, plan for escape

– Where are you

– Where are friendly troops

– What are you going to do when you get out?

– Which direction are you going to travel

– Does your clothing blend or contrast

Assess the situation

– Security

– Conditions (location, weather, time of day)

– Reprisal if unsuccessful ?

Avoid aggressive or combative behavior

– You always retain the right to self defense.

Copyright © 2006 Daniel

Risk Mitigation, Inc. All rights

reserved.

Actions During Rescue

Pre-plan; – Identify the safest area

– Avoid doors, windows & open areas

– Stay close to cover, or safest area

Lie down on floor

Non-threatening posture – Face down, spread eagle, arms extended, palms up &

empty

Do NOT attempt to help recovery forces

Call out position if necessary

Follow instructions

Repatriation

Repatriation is the process of returning a person to their place of origin or citizenship. This includes the release and recovery of returning POWs and or DoD Contractors and or American Citizens held as enemy prisoners of war or hostages to their own country.

Reintegration Process The post-captivity reintegration process involves three phases. The program was developed from lessons learned after the release of prisoners of war following the Vietnam War.

Phases Phase I: Recovery – Medical / Psychological exams Phase II: Comprehensive counseling, decompression and debriefings

Phase III: Home base -- family reunions, medical care and debriefing

Timeline There is no set timeline for any phase of reintegration. In general, Phase I is designed to be completed quickly. Phase II generally takes three or more days, while Phase III activities are also highly variable.

Thank you

BACKUP SLIDES

Geo-Spatial Vertical

Geo-spatial accountability is our strong suite were we not only have the capability to provide GSM, Iridium, and SARSAT

communications/reporting devices but we also have the ability to set up and operate the actual operations center that tracks those

that are operating in less than permissible conditions.

Located in Herndon, Virginia is GROM’s World Wide Accountability Center named “Constant Guardian”. This system can be

deployable, sustainable, and versatile in all types of conditions and environments.

Recovery Vertical

GROM Technologies has on staff personnel who have conducted numerous live and remains-recovery operations globally.

As a company we are focused on providing full spectrum support to recovery operations for both military and civilian personnel.

Several members of the team have conducted recovery operations in Iraq, Afghanistan and other areas in support of the War Fighting COCOMs mission. GROM has the ability to concurrently flex and marshal 4 experienced recovery teams in support of the OSD DPMO POW MIA and JPAC mission set.

Disaster Response

GROM Technologies Disaster Assistance Response Teams (DART) consists of rapidly deployable specialized teams of recovery professionals. These teams are prepared to deploy to any location on the globe in order to support those that have been affected by war, man-made or natural disasters, and civil disturbance.

GROM specializes in the following areas of support:

Response Assessment and Analysis

Medical Support and First Responder Activities

Deep penetration Search and Rescue (SAR)

Geo-spatial accountability operations

Command and Control of disaster sites

Power distribution and water purification solutions

The GROM Difference

GROM Team’s extensive “real world” experience in the military, Department of State and corporate America culminate to create this dynamic training experience in order to guide individuals in the practices for safe and secure experiences while traveling overseas.

Our combined expertise enables GROM to deliver full spectrum pre-departure training that can be designed to meet the needs of our clientele.

The end state is a “best in class” training experience with the objectives of safe and secure travel and returning home safely.

Business Verticals

Ge

o-S

pa

tia

l Acco

un

tab

ility

Se

rvic

es

Pe

rson

ne

l R

eco

ve

ry S

erv

ices

Pre

-Dep

art

ure

Tra

inin

g

Mitigate the Risk

Powerful, easy to use Learning Management System (LMS) that

allows organizations to deploy, track and report web-based Travel

Safety and Health Certification.

Allows travel security and risk managers to track training

compliance for online pre-deployment training.

At the conclusion of the lesson plan, a

completion certificate is provided for

documentation

Certifications can be provided to the

individual student or a designated

individual/department within an

organization.

Compliance Reports

Compliance Reports can be saved in Excel, Word or PDF formats

Data migration to third party HR programs (ie: People Soft) for

seamless support

Annual Recertification

Annual recertification is made easy with

the ability to test on mobile devices