The Presidia Library
The latest articles and papers authored by our Presidia Team
Technical Surveillance Counter Measures
In todays business landscape consideration of threat levels and protecting your intellectual property against outside entities is a growing concern for every organization. What is the cost of not utilizing a Technical Surveillance Countermeasure (TSCM) program in your daily business? Is the cost associated with the implementation of an effective TSCM program worth a loss on the bottom line of your business? Have you considered the negative impact on the reputation of your organization and the embarrassment to your Executives and Leaders?
What Makes a Good Security Leader?
The list of traits attributed to great leaders is long and varied indeed: courage, strength, intelligence, honour, energy, adaptability, innovation, initiative – and there are many, many more. In fact, when it comes to discussing leadership attributes, journalists, historians and social scientists seeking to chronicle and analyze the exploits of great leaders are constrained only by vocabulary and imagination.
What is your Security Strategy?
Security is often thought of as a tactical issue that should remain at the “gates and guards” level. While these tactical security pieces may be important they are most effective as part of a security strategy that is designed to mitigate the threats and risks to your company and its operations. True security strategy is integrated into a company’s “C Suite” and is seen as an enabler. The questions and discussion that follow outline the framework for a company security strategy.
Assessing and Tracking Threats
Recent incidents of violence in the workplace in Canada tragically illustrate what happens when threats materialize into actions; they serve as a stark reminder to businesses across the country of their responsibility to protect their employees in the spirit of “due diligence” and “due care and attention.”
Executive Protection Considerations
In today’s fiscally challenged business environment it may be difficult to justify providing an Executive Protection Program for an organization’s key executives. However, in making this important decision one also has to consider what the cost would be to the organization’s bottom line and, perhaps more importantly, to its reputation should a key member of the senior leadership team be the target of an act aimed at harming or embarrassing the individual and the organization.
Due Diligence Investigations
If asked, many companies would say that they have “due diligence investigation” processes in place; however, these processes are often designed to review the financial and operational affairs of a particular company and fail to closely inspect the background of the main principals or executives of the company. In addition, many companies do nothing more than cursory checks on individuals they are about to hire. The lack of a robust background investigation can result in wasted time and can cause legal and financial problems.
A Solid Foundation for Administrative Investigations
"Is it time for the implementation of standards, including proper training and oversight, as it pertains to the conduct of “administrative investigations”? It could be argued that administrative investigations are purely “administrative” in nature and as such there is no requirement for an enhanced capability. However, it can also just as easily be argued that these types of investigations can have a very negative impact on the lives of those being investigated, including the potential loss of their livelihood. They also bring with them a large degree of “personal and institutional liability” on the part of those individuals conducting the investigations and the""organizations for which they are employed."
Marine Port Security
"Since 9/11, marine port security has been the subject of increased scrutiny as it is clear that contraband flows - undetected and uninterrupted - through access and egress points of both Canada and the United States. Numerous reviews initiated by the United States Government Accountability Office (GAO) and the Canadian Standing Senate Committee on National Security and Defence have clearly articulated that ports are a haven for criminal activity and organized crime, as well as targets for potential terrorist activity. Both these reviews demand an increase in the level of intelligence sharing among partner agencies focused on policing and security of marine port operations."
Setting up an Intelligence Hub
Intelligence in some form is in use today across a broad spectrum. No longer just the purview of Government entities, business intelligence is a common term and practice among corporations. Today, in the internet age, there is an abundance of readily accessible information about any given topic, organization or person. The immense growth of social networking in recent years has added to a rich information bank that is readily accessible to anyone with an internet connection. The challenge today is to sift through vast quantities of information to uncover and piece together the information you require into an intelligence picture that supports your operations. The value of your own information can increase exponentially when combined with open source research and information from other entities with whom you are willing to share.
"Media reports continue to include stories about company executives, oil field workers and regular travellers who have been the victims of kidnappings, armed robberies and murder while visiting foreign countries. Recent events have seen a Canadian woman kidnapped in northern Nigeria and her captors demanding $136,000 for her release. This woman was a financial advisor who was in Nigeria with other Canadians as part of an exchange program and she was kidnapped as she was entering a house after attending a social event. There are also ongoing reports of oil workers being kidnapped by rebels in South America and Africa; it would appear that these types of incidents are increasing rather becoming a thing of the past."