Security Consultants – WPG Security Consulting Services

The World Protection Group is a leader in the security industry offering security consulting services and via their consulting unit provides services that supplement in-house or contract security consultants. Our objective is to provide clients with an unbiased view of complex security issues, independent from their own security consulting services and investigative services. This can be the distinguishing factor of maintaining the security and safety of a facility—we want our Clients to have the information and resources necessary in making fundamental business decisions.

Security Site Assessment

A Security Site Assessment determines if the current protective measures in place around the premises are appropriate for the risk environment and are consistent with best practices. WPG’s objective is to identify, through gap analysis, any weak points in security and to provide robust and sound recommendations for enhancement of the security procedures.

Part 1 Interviews: The assessment will be framed by an initial series of interviews. For residential properties, these are with owners, any relevant staff and appropriate law enforcement officials. For commercial properties, these interviews are with security and safety employees, key management and appropriate law enforcement officials. The objective of these interviews is to identify key issues, internal and external threats and any current crime problems or other issues that may affect the location.

Part 2 Physical Assessment: The following is a basic list of areas to be inspected at the site:

Categorize: The assessment will categorize the threats and identify their source, capability, motivators and likely triggers.

Analyze: WPG will map each risk on an Impact/Likelihood matrix. The five levels of impact (insignificant, minor, moderate, major, extreme) will be matrixed with the five levels of likelihood (rare, unlikely, credible, likely, almost certain).

Evaluate: The Risks are prioritized for treatment based on the Client’s risk tolerance.

Risk Treatment: WPG will design a treatment strategy designed to support the Client’s objectives and processes or activities and which allows continuous monitoring of its effectiveness.

WPG Data Mining and Presentation Tools: WPG recognizes that along with good skills, professionals can be much more effective in conducting risk assessments and security reviews when they use dynamic tools. We responded to this notion by utilizing the very best available, produced after ten years of research and development – the “All Threat / Hazard Vulnerability Assessment” tool for security professionals. The final report relies upon intelligence resources subject matter experts, best-known practices and methodologies derived from FEMA and ASIS.

Security/Executive Protection Audit

The World Protection Group provides both security and executive protection audits, which incorporate an extensive analysis of corporate headquarters, and security programs that pertain to executive protection and the personal security protocol of Executives. The Audit focuses on executive protection techniques based on the U.S. Secret Service-way of providing protection and specifically addresses recruitment and hiring of agents, procedures and policies, and operational methods. WPG aims to create a consistent body of knowledge around the area of executive protection and provides a written report with recommendations to the client upon conclusion of the project.

Vulnerability Assessment

WPG provides vulnerability assessment to determine the validity of possible threats and assess the property and security protocol currently in place to improve current security practices and recommend physical improvements. The vulnerability assessment analyzes access control and perimeter security, emergency preparedness, alarm/camera systems, and evaluates current security already in place. The assessment provides a framework that security planners and policymakers can use to prepare for, and protect against, threats to and vulnerabilities of facility systems.

The intended audience of this assessment includes security planners, both experts working directly within facility systems and those who are responsible for facility security through their work in governmental or professional organizations, and policymakers. Given the open and accessible characteristics of the facility, the unpredictability of terrorist attacks, the continual evolution of risk as terrorists learn and improve on their capabilities, and finite resources for security provisions, the industry faces a complex security problem that has existed for decades.

This assessment takes into account that this facility may have considerable vulnerabilities because of its defined periods of use, designated access points, storage of sensitive personal information, minimal security forces, and numerous avenues of penetration and escape for attackers. Risk analysis is a central activity in the security assurance of critical infrastructures and mass transit systems. In fact, the results of risk analysis are needed to guide the design of surveillance and protection systems. Risk analysis is commonly performed using qualitative approaches, based on expert judgment and limited ranges for risk attributes (e.g. low, average, high). Model-based quantitative approaches can be used in conjunction in determining the risk indices by taking into account the frequency of occurrence of threats (e.g. considering likelihood and historical data) and analytically determining the impact/consequences (damage of assets, service interruption, people injured, etc.).

Threat Management

Stalking, workplace threats and violence, theft and extortion are realities in today’s society and protecting your employees, family and yourself requires vigilance and attention to warning signs. The World Protection Group’s (WPG) trained and highly experienced security consultant experts have the resources to determine the validity of the associated risks and can provide guidance to minimize the threat. Through a series of proven processes, WPG experts can quickly conduct a vulnerability and threat assessment of the situation and develop a threat management plan and course of action.

WPG experts work closely with law enforcement to collect information, gather potential evidence and monitor communications. If necessary, the threat management plan will outline increased security measures and a plan of action based on the developing threat. WPG experts will offer advice regarding quick response options, legal recourse, liability issues and other measures to disrupt the pattern of the threats and resolve the problem.

If the circumstances warrant, this appraisal will include an independent threat assessment by Threat Assessment Group, Inc. (TAG), whose behavioral analysts are leading forensic psychiatrists, forensic psychologists, and former FBI profilers. TAG’s recommendations will help target our approach, helping us to provide efficient as well as effective Protective and Threat Management services.

Surveillance

Surveillance allows Clients to create observations and accumulate data that can be useful for the protection of themselves and their assets or investigations. It can identify and therefore minimize the presence of a hostile environment. With the analysis of the surveillance data, preventative and proactive measures can be developed.

The World Protection Group (WPG) Surveillance Officers have strong security backgrounds with the majority having prior law enforcement experience. We have worked a significant number of surveillance engagements, and we are experts in the art of discretely gathering information and evidence. WPG can deliver proof of fraud on video (if any), daily reports of hourly activity of the person under surveillance, and our Surveillance Officers are available to testify in court, as necessary.

Background Checks

The World Protection Group, Inc. – a full-service, international firm specializing in executive security – protects clients from any type of threat, invasion of privacy, random crime, and unnecessary embarrassment. The firm’s philosophy and techniques are based on the U.S. Secret Service method of proactive and preventative protection.

Corporate Security Program

The World Protection Group wants to ensure that employees and guests feel safe at a corporate facility, like managing threats, procedures for guests entering/exiting the facilities, access control, and physical and electronic security. WPG suggests open, continuous dialogue on security and WPG security personnel.

From time to time, corporations will receive inappropriate correspondence via letter, email/internet, phone call, text, unwanted visitor, packages. The World Protection Group highly recommends that these corporations’ staff is trained on how to handle this material. The training will ensure that all threatening material go directly to WPG Corporate Headquarters where it will be analyzed in collaboration with law enforcement and WPG partner – renowned forensic psychiatrist Dr. Park Dietz. Once a threat level is established – WPG will work to develop a strategy to manage the threat. In addition, WPG will create a crisis management plan to identify procedures, emergency supplies and emergency notification procedures.

Yacht Security

The World Protection Group offers services to companies and individuals to minimize the risk and liability of their Yachts. We have the resources to provide close protection, consulting and training, including Maritime Security for Vessel Personnel or Maritime Asymmetric Threat. Training can be customized for a Client’s vessel, fleet and facility by incorporating aspects of operations and the security plan; it is particularly effective when conducted in conjunction with exercises, drills or “hard security challenges.

We can provide you with assessments and security plans including:

Technical Counter Measures

Sweeps / Bug Detection

Investigators will conduct visual, electronic, and physical investigations of systems that may be affected by technical surveillance measures. If any security problems are found, investigators can use counter measures or can gather evidence so that the company or individual can pursue legal action against those individuals involved in the technical security breach.

Our team will:

To properly secure a single executive office for corporate or government clients we recommend at least six sweeps per year. These sweeps should be evenly spaced out on a quasi-random basis, including one annual comprehensive (three to seven day) sweep and an annual or quarterly comprehensive physical security audit.

A full report (photographs and comments on physical security, information security : document security and electronics, access to IT network, PDA’s : office practices, overlook, acoustics etc) is provided.

Narcotics and Explosive Search

WPG team will search and detect minute traces of cocaine, opiates (heroin and morphine), cannabis (marijuana and hashish) and amphetamine-type stimulants (amphetamine, ecstasy and methamphetamine).

Our explosive detection search will utilize: The E.L.I.T.E.™ Model EL100 which is the only product sensitive to a broad range of explosives that is inexpensive enough, reliable, rugged and simple enough to be distributed to every policeman, special forces team, police and military vehicle for on-the-spot testing for trace explosives. The EL100 is currently in use with state and local police as well as the US TSA, FBI, SOCOM and the US Army; it is also used by commercial security for the protection of power plants, cruise lines, and public transportation.

The new ELITE Model is also used to detect TATP (“Mother of Satan”), HMTD, MEKP and concentrated hydrogen peroxide in solution, in one self-contained disposable device. The EL230 is unique in that it measures suspect particles and vapors. It will detect trace amounts of peroxide-based explosives and will detect hydrogen peroxide solutions without having to come in contact with a suspect liquid.

In the United States all TSCM services will meet or exceed the technical requirements of the following standards:

Director of Central Intelligence, Physical Security Standards f or
Sensitive Compartmented Information Facilities (SCIF) Directive
1/21, U.S. DCI, July 29, 1994

Director of Central Intelligence, Technical Surveillance
Countermeasures Directive 1/22, U.S. DCI, July 7, 1994

Director of Central Intelligence, Director of Central Intelligence

Directive Procedural Guide No. 1 Requirements f or Reporting and Testing
Technical Surveillance Penetrations, U.S. DCI, August 1984

Director of Central Intelligence, Director of Central Intelligence
Directive Procedural Guide No. 2 Requirements f or Reporting and Testing
Hazards, U.S. DCI, August 1984

Director of Central Intelligence, Director of Central Intelligence
Directive Procedural Guide No. 3 Guidance f or Conducting Audio
Countermeasures Surveys, U.S. DCI, August 1984

Defense Intelligence Agency, DIAM 50&3, Physical Security Standards for
Construction of Sensitive Compartmented Information Facilities

Defense Intelligence Agency, DIAM 50&4, Security of Compartmented
Computer Operations

Defense Intelligence Agency, DIAM 50&5, Sensitive Compartmented
Information (SCI) Contractor Administrative Security VOL I and II
Department of Energy, DOE Technical Surveillance Countermeasures
(TSCM) Procedural Guide, U.S. DOE, April 1988

Department of Energy, DOE Technical Surveillance Countermeasures
(TSCM) Operations Manual, U.S. DOE, April 1988