travel safety for the global employee - pzi consulting · travel safety for the global employee ....
TRANSCRIPT
About Us
GROM Technologies, Inc. is located in Clearwater, Florida with satellite office
in Washington, D.C. We specialize in boutique, full spectrum, geo-spatial
accountability, and rapid response personnel recovery in support to global
disasters.
GROM is differentiated by skilled management; which marshal diverse and
multifold resources to inspire innovative solutions for unique and extremely
complex tasks.
Our companies key strength is finding and applying cost effective cutting
edge technology that meets our client’s requirements; while working in an
environment that is extremely fluid and dynamic with ever evolving mission
priorities.
GROM has a unique blend of university academia, leading edge technology,
proven vendor performance, and client satisfaction. We also have in depth
expertise in Special Operations activities, integrated threat management,
and defense contracting.
GROM has applied for woman owned company status.
Global Travel Realities
Global movement of people, goods, and ideas has expanded significantly in the past decade that have led to dramatic increases in the following areas:
– Increased global leisure activity
– Educational institutions sending more faculty and students abroad to teach and learn
– Religious non-profit organizations reaching across the globe to support those in need
As the economy continues to exit a global recession, corporations are putting business travelers back on the road
Enhanced traveler safety and security is a top priority for all organizations and families to ensure goals and objectives are realized throughout the traveling experience
“A Globalized society offers a complex web of forces and factors that bring
people, cultures, markets, beliefs and practices into increasingly greater
proximity to one another with increased safety risks that must be clearly
understood by all travelers”
Safe Travel Concerns
Analysts and travel experts agree that security and safety around the world varies -- sometimes dramatically -- from place to place
Some countries, like Mexico are as dangerous as ever, while travel in many countries is as safe as ever, depending on one's destination, actions and common sense
Security professionals agree – pre-trip training and planning is necessary to operate effectively and safely in most locations around the globe
Step 1: Before Travel
Learn about the country they plan to visit
– including local customs, laws and language.
What to pack/carry as you travel
– critical documents like passport.
Best practices for ensuring safety abroad.
What your employees need to do before they leave
the country include:
Personal Security Travel Preparation
Cultural Awareness:
Being an “ugly American” may target you for crime or worse.
"When in Rome, do as the Romans do”
Do your research before you travel:
Lonely Planet guides
US State Department website http://travel.state.gov
Overseas Advisory Security Council www.osac.gov
Step 2: Travel Health Education
Learn about what diseases are prevalent in the area(s) of planned travel.
Make plans to receive appropriate vaccinations before leaving and possibly on return.
Recognize what is safe to eat and drink and what should be avoided.
Health concerns when traveling abroad include:
Step 3: Situational Awareness &
Safety
Learn how to protect yourself
simply by becoming aware of
your surroundings and
noticing when things are not
right.
Learn the five phases of
hostile surveillance and what
you can do to prevent
becoming a victim.
Step 3: Situational Awareness & Safety
Travel Security
Travel Defensively
When Traveling:
CLOTHING
– Travel in conservative civilian clothing that
does not draw attention to your nationality or
status i.e. leave your business suit in your
luggage.
– Don't wear American identified items such as
cowboy hats or boots, baseball caps, American
logo T-shirts, jackets, or sweatshirts.
– Don't wear distinct items such as company
shirts, expensive glasses, flashy watches or
jewelry. Leave your Rolex at home.
– Wear a long-sleeved shirt if you have visible
tattoos.
The goal is to blend in with fellow
travelers. You should strive to fit in the
crowd and not draw attention to
yourself. DON’T MARK YOURSELF
as important like this individual does.
Travel Security
Travel Defensively
Traveling by Air:
At the airport
– Arrive at the airport 3+ hours in advance.
Count on extended lines, long waits and
multiple security screenings.
–As an American passport holder, expect
added scrutiny by custom officials.
– Retain physical control of your personal
carry-on items at all times. Have your
passport and travel documents readily
available at all times.
– Obtain the local currency in advance.
– Set up secure transportation options in
advance. Only take taxis from official stands.
Travel Security
Travel Defensively
Hotel Accommodations:
– Book reservations with major International Hotel chains but avoid
recognized US brands in developing countries or where the threat of
terrorism is high (usually the first targeted).
– Room Selection:
1) Above the second but below the fourth floor.
2) Does not overlook the hotel’s lobby
3) Ideally near the fire exit
REMEMBER: Hotels in developing countries are normally used by the
National intelligence services to obtain information about the traveler. It
does not matter who you are!
From Personal Security Guidelines for the American
Business Traveler Overseas - OSAC Dept of State
Travel Security
Travel Defensively
Hotel Accommodations - Individual Protection Measures (IPMs)
- Do not discuss your business or travel plans with strangers or in public areas
- Always maintain control over your proprietary information
- Never leave your laptop computer in your hotel room
- Never leave your cell phone in your hotel room
- Never leave your valuables in your hotel room, place in safe at front desk if possible
- Avoid using your room safe as it is probably compromised
- Never leave your passport in your hotel room
- Leave the television/radio on when you leave the room
- Strongly recommended you never make a international phone call from your room
- Use your lock whenever inside your hotel room
- Always use peephole if there is a knock on your door
- Maintain a neat room to determine if someone has rummaged through your belongings
- If possible, avoid using a hotel that is exclusively used by Western foreigners; such a hotel has likely been the target of terrorists in the past and will be in the future.
From Personal Security Guidelines for the American
Business Traveler Overseas - OSAC Dept of State
Travel Security
Travel Defensively
Traveling by Auto - Determine from local contacts the best travel options - Work out arrangements to use taxi/drive exclusively if feasible - If driving, always be familiar with host country laws - If driving have proper insurance and know accident procedures - When in your car, always drive with doors locked and windows up - Always practice good security awareness and - Expect the unexpected when stopped at intersections - Be prepared for the Swarm Technique!
From Personal Security Guidelines for the American
Business Traveler Overseas - OSAC Dept of State
Hostile Surveillance Awareness
Targeting Process: Hostile Surveillance usually consists of five distinct
steps, culminating in the actual kidnapping incident outlined below:
1
1) Target Selection: The kidnappers usually assemble a list of more than one potential target
which meets their particular objective;
2
2) Surveillance: Potential targets are placed under surveillance to assess, identify and chose the “softest” target;
3
3) Planning: Details of the attack are finalized;
4) Deployment: Kidnappers will deploy to the selected location for execution of the plan.
4 5
5) Attack: The kidnapping time and location are predicated on the information gathered in
previous steps and must offer an high opportunity for success, or it will not take place.
To be successful, an attack must contain the following three elements:
Cover: Concealment for the kidnappers to stage an ambush.
Control: Ensure the target remains in the ambush zone long enough to kidnap
Escape: Safe escape from the ambush site with multiple exit routes.
Surveillance – How to Detect It
Don’t assume the threat is always behind you or always men. They can be anyone, anywhere. Trust your instincts. Trust your sixth sense and intuition if you notice an individual or group intently watching or following your movements. Indicators of surveillance include:
1) Walking past an individual who then begins to follow you at a distance.
2) Observing someone out of place who doesn’t seem to have a reason for being there.
3) Someone looking at you then quickly looking around as you notice his stare.
4) The same vehicle, make and model, is following you home more than once.
Surveillance – How to deal with it
If your gut tells you that you are being watched or followed, there are passive measures you can take while on foot or while driving. It is important not to bring attention to yourself; attempt to be subtle as you confirm the surveillance. Conceal your suspicion until you have confirmed you are under surveillance.
If walking, circle the block again or retrace your steps. Adjust your pace or pause in a public area where there is a large crowd. Attempt to use the reflection in a window to observe if you are being followed. Change your route suddenly: flag down a taxi or use another form of public transportation.
When driving, alternate your speed and your normal route. Make a U-turn or drive around the block to see if the marked vehicle is still trailing you. Be aware that vehicle surveillance may use several cars, so be on the lookout for more than one suspicious car.
If you confirm the surveillance, don’t be obvious unless you feel danger is imminent. Conceal your suspicion and DO NOT confront your tail. Proceed immediately to a safe area and alert trusted authorities as soon as possible. Try to provide a detailed description of the individual(s)/vehicle(s) and an accurate account of the events leading to the surveillance.
Remember –
Source: Recognizing Trouble Before it Happens
Juan A. Garcia Jr. High Risk Security Services
The rule of thumb for
surveillance sightings:
• Once = suspect
• Twice = possible
• Three = probable
Speak with law
enforcement if you
suspect surveillance
Step 4: Personal Security Measures
Learn how to safeguard
valuables and prevent theft
from pickpockets.
In the unlikely event of an
abduction, learn specific
strategies to increase personal
safety.
Personal Security Measures give your traveler the
insight to further protect themselves from becoming
the target of crime and kidnapping.
Hostage-Taking, Abduction,
Kidnapping (HAK) Defined
Hostage-taking - Seizing or detention of an individual coupled with a threat to kill, injure or continue to detain such individual in order to compel a third person or governmental organization to take some action.
Abduction - Action or an instance of forcibly taking someone away and incarcerating them against their will.
Kidnapping – taking an individual away illegally by force (abduction), typically to obtain a monetary ransom.
OVERVIEW
Stages of Captivity
Resisting Exploitation
Captivity Recommendations
Escape & Rescue Considerations
Kidnapping Tactics
Military, Security, Diplomats, Journalists
Small + Weak + Unarmed + Isolated = Easy Target
Surveillance
Goal is to overpower by using anesthesia
(injected, inhaled) choke wire, Stun-gun, Mase
Blindfolded, restraints, possible hearing impaired
Transport
Use of disguises, false names, etc.
Distractions
Capture Phase
Time permitting
– Make a distress call, then destroy the communication device
– Hide, destroy, or neutralize equipment and information (e.g.)
• Shipping manifest
– Hide small signaling aids in clothing / on person
– Consume any water and food
Most violent phase, shield / protect yourself
Don’t antagonize
Overcome Shock
– Stay alert but don’t show it
– Be ready for quick decisions
Be “Escape Minded”
Exploitation begins
– My begin shortly after capture & continue.
Movement Phase
The most probable, moved every few hours or days – Political hot potato – Possibly moved from “safe house” to “safe house”
Away from coalition forces/friendly control May be shown off as a “War trophy” – Hostile or curious crowds are possible
Increased chance of interrogation Escape potential still good – Confusion, Distractions – Less Tension – Untrained guards – Unsecured holding facilities
Dedicated Fixed Facility
Possibly far from friendly forces
Better trained guards
Propaganda / Exploitation – May begin shortly after capture & continue
Escape Considerations – Think “escape”
• Who, What, When, Where & How
– Are there Repercussions ? • To those left behind
• For failed attempt
– Cultural / Racial Differences
The Will to Survive
All personnel have a responsibility to resist – What motivates you?
• Family, friends, beliefs, hatred
Strong will and strong posture may reduce the likelihood of future exploitation
“Battle of wills” not a “Battle of wits” – Never believe you are better or more
intelligent than your captors / interrogators
Captivity Recommendations
Humanize yourself
– Human being vs. world oppressor / Great Satan
– Discuss commonalities such as family, religion, sports (examples)
Be respectful and expect, or ask for respect
– Courtesy costs nothing, lack of can become costly.
– Polite & professional, “Sir”
– Control displays of emotion
• Whining or begging is frowned upon, viewed as weakness
Show apparent willingness to listen without engaging in discussion
– Do not pass judgment, praise, pander, participate or debate.
Introducing non-inflammatory topics at critical times (impasses, demands) may reduce tensions
Cautions;
– Appearing arrogant may get you hurt
– Sensitive topics
• Politics, education, sex & religious beliefs
• Avoiding language such as “gun, kill, punish,” etc
Captivity Recommendations
Vital to get your identity and status known
– Get on camera = proof of life or “POL”
Attempt to establish contact with friendly forces and other captives
Communicate with other captives about
– Who is being held, how long have they been held, what has the captor asked for, what are the captor goals / identities.
– Are you being held w/ military or civilians?
Leave evidence of presence – DNA, initials, clothing
Copyright © 2006 Daniel
Risk Mitigation, Inc. All rights
reserved.
Escape
Have been successful
May happen at any time
Always be looking
Defeat restraints
Copyright © 2006 Daniel
Risk Mitigation, Inc. All rights
reserved.
Escape Considerations
Escape is risky but may become necessary
Be escape minded at all times, plan for escape
– Where are you
– Where are friendly troops
– What are you going to do when you get out?
– Which direction are you going to travel
– Does your clothing blend or contrast
Assess the situation
– Security
– Conditions (location, weather, time of day)
– Reprisal if unsuccessful ?
Avoid aggressive or combative behavior
– You always retain the right to self defense.
Copyright © 2006 Daniel
Risk Mitigation, Inc. All rights
reserved.
Actions During Rescue
Pre-plan; – Identify the safest area
– Avoid doors, windows & open areas
– Stay close to cover, or safest area
Lie down on floor
Non-threatening posture – Face down, spread eagle, arms extended, palms up &
empty
Do NOT attempt to help recovery forces
Call out position if necessary
Follow instructions
Repatriation
Repatriation is the process of returning a person to their place of origin or citizenship. This includes the release and recovery of returning POWs and or DoD Contractors and or American Citizens held as enemy prisoners of war or hostages to their own country.
Reintegration Process The post-captivity reintegration process involves three phases. The program was developed from lessons learned after the release of prisoners of war following the Vietnam War.
Phases Phase I: Recovery – Medical / Psychological exams Phase II: Comprehensive counseling, decompression and debriefings
Phase III: Home base -- family reunions, medical care and debriefing
Timeline There is no set timeline for any phase of reintegration. In general, Phase I is designed to be completed quickly. Phase II generally takes three or more days, while Phase III activities are also highly variable.
Geo-Spatial Vertical
Geo-spatial accountability is our strong suite were we not only have the capability to provide GSM, Iridium, and SARSAT
communications/reporting devices but we also have the ability to set up and operate the actual operations center that tracks those
that are operating in less than permissible conditions.
Located in Herndon, Virginia is GROM’s World Wide Accountability Center named “Constant Guardian”. This system can be
deployable, sustainable, and versatile in all types of conditions and environments.
Recovery Vertical
GROM Technologies has on staff personnel who have conducted numerous live and remains-recovery operations globally.
As a company we are focused on providing full spectrum support to recovery operations for both military and civilian personnel.
Several members of the team have conducted recovery operations in Iraq, Afghanistan and other areas in support of the War Fighting COCOMs mission. GROM has the ability to concurrently flex and marshal 4 experienced recovery teams in support of the OSD DPMO POW MIA and JPAC mission set.
Disaster Response
GROM Technologies Disaster Assistance Response Teams (DART) consists of rapidly deployable specialized teams of recovery professionals. These teams are prepared to deploy to any location on the globe in order to support those that have been affected by war, man-made or natural disasters, and civil disturbance.
GROM specializes in the following areas of support:
Response Assessment and Analysis
Medical Support and First Responder Activities
Deep penetration Search and Rescue (SAR)
Geo-spatial accountability operations
Command and Control of disaster sites
Power distribution and water purification solutions
The GROM Difference
GROM Team’s extensive “real world” experience in the military, Department of State and corporate America culminate to create this dynamic training experience in order to guide individuals in the practices for safe and secure experiences while traveling overseas.
Our combined expertise enables GROM to deliver full spectrum pre-departure training that can be designed to meet the needs of our clientele.
The end state is a “best in class” training experience with the objectives of safe and secure travel and returning home safely.
Business Verticals
Ge
o-S
pa
tia
l Acco
un
tab
ility
Se
rvic
es
Pe
rson
ne
l R
eco
ve
ry S
erv
ices
Pre
-Dep
art
ure
Tra
inin
g
Mitigate the Risk
Powerful, easy to use Learning Management System (LMS) that
allows organizations to deploy, track and report web-based Travel
Safety and Health Certification.
Allows travel security and risk managers to track training
compliance for online pre-deployment training.
At the conclusion of the lesson plan, a
completion certificate is provided for
documentation
Certifications can be provided to the
individual student or a designated
individual/department within an
organization.
Compliance Reports
Compliance Reports can be saved in Excel, Word or PDF formats
Data migration to third party HR programs (ie: People Soft) for
seamless support