4Travel Pre-Plans Completed Valmont Travel Registry Form Current passportCurrent Visa if neededReceived pre-plan packet
5Travel Pre-Plans Travel Registry Form OVERSEAS TRAVEL REGISTRYTO BE COMPLETED BY TRAVELER MAKE SURE TO ADD ANY DEPENDENTS TRAVELING WITH YOUEmployee Name:Home Site Location:Employee DOB:Employee Passport or Passport Card #: (please specify which)Country Being Visited:Site Address:Visited Site Contact & NumberEmployee Cell Phone#:Employee Address:Scheduled Date Left:Scheduled Date Return:Emergency Family Contact Name:Emergency Family Contact #:Division Safety/Security Contact Info:Purpose of VisitType of VisitScheduled Date to Arrive at DestinationScheduled Date to Leave DestinationSupervisor NameSupervisor Contact and phone#businessone-timePassport Date of IssuePassport ExpirationPlease Return this form along with a scanned copy of your passport to security professional.TO BE COMPLETED BY CORPORATE SECURITY PERSONNELOVERSEAS PRE-PLAN CHECKLISTYES / NON/ADate CompletedHas employee completed Overseas Registry form?Employee registered through Travel.State.Gov?Has employee provided a copy of passport with company form?HAS EMPLOYEE BEEN PROVIDED WITH THE FOLLOWING?Recent travel warnings and alerts provided to employee?Most recent crime reports?Updated road & traffic Hazards?Updated Epidemic updates?
6Travel Pre-Plans Passport Is your passport up to date & current?Is your emergency contact information correct?Do you have a copy of your Passport with you?Did you leave a copy of your Passport with family?Did you leave a copy of Passport with your company?
7Travel Pre-Plans Visited Country Visa Is a separate visited country Visa needed?Is your Visa current & valid?Are there specific inoculations required?
8Employee Responsibilities Know the current crime trends.Be aware of the potential for terroristacts.Be aware of natural disasters.Be aware of epidemics at that location
9Travel Pre-Plans Pre-Plan Package HAVE YOU RECEIVED?Overseas security awareness training?Wardens Travel Warnings & Alerts?Location crime reports?Epidemic & road safety updates?Local Embassy or Consulate contact numbers?
10Employee Responsibilities MESSENGERS of INTUITION “You must NEVER ignore your intuition and the tiny flickers of doubt” It can be the BEST protection we have against violence or worse to ourselves” TRUST YOUR GUT INSTINCTS!
11Situational Awareness Is She Situationally Safe?
12Situational Awareness Anticipate What May Happen Next Profile the scene & the person.Do not resist violent economic crime, however if it is a violent crime make every effort to resist and escape.Assume criminals are armed.Ensure that public transportation is legit.Pay attention to surroundings and not cell phones or texting.Tear gas or pepper spray is not recommended. Personal air horn has much greater effect.
13Situational Awareness Enhancing Personal Security Have the proper information/advice.Focus on your situational awareness.- Be aware of your surroundings and those around you.Lower your profile- Do not dress American- Do not advertise wealth or tourismKnow the threat.
14Situational Awareness Enhancing Personal Security Loners get victimized.- When possible travel in trusted groups.Stay in know & well lit areas.Be predictably unpredictable.- Change your travel routes and times.CHOOSE WISELY
15Criminal Threats Crime Trends ATM abductionKidnapping for ransomIPod theftPortable GPS devicesIdentity theftStrong arm robbery
16Criminal Threats Carjacking Foreigners targeted- Do not blare music- Do not advertise as a touristVehicle selection- Flashy “look at me vehicles” draw more attention.- Always lock you vehicle both when your in it & out of it.- Do not leave valuables in plain view inside vehicle.
17Criminal Threats Aviation Threats Move through airport screening as fast as possible.Other than passports keep low profile as an American.Make every attempt to use accredited airlines.Do not put Company name or your name outside of luggage.- Put cell number on luggage tags & place your private information inside luggage.There is still substantial risk of crimes being committed inside of airports as well!
18Criminal Threats Hotel Security Keep low profile when checking in- Do not announce out loud to co-workers or others your room #.Floor Selection- Make every attempt not to stay on first floor.- Try to obtain a room between 2nd & 8th floors.- Count how many room doors there are between yours and the nearest emergency exits.
19Criminal Threats Hotel Security Hotel Crime- Never open your door to unknown persons.- Use “peep hole” in door when possible to identify persons.- If you order room service request to see identification prior to opening door or request that food be left outside the door.- Never leave personal information or valuables in the open, use safe if room is equipped with one, use hotel safe at desk or carry all with you.
20Criminal Threats Hotel Security Hotel Crime- Never open your door to unknown persons.- Use “peep hole” in door when possible to identify persons.- If you order room service request to see identification prior to opening door or request that food be left outside the door.- Never leave personal information or valuables in the open, use safe if room is equipped with one, use hotel safe at desk or carry all with you.
21Surveillance Detection Diplomatic Security Overseas Training
22Surveillance Detection Objective Provide you with an awareness of the most common types of surveillance & the proactive measures you can take to help form becoming a target.
23Surveillance Detection Purpose of Surveillance Intelligence Services – InformationCriminal – Physical / FinancialTerrorist – Political / Fear
24Surveillance Detection Methods Stationary / Fixed – Person, vehicleMobile – Drive by, walk by, followNormally it is a combination of both.
25Surveillance Detection The Attack Cycle Normally abductors, terrorist, cartels, etc will:Develop a list of potential targetsSurveillance / information gatheringTarget selectionAttack planning – surveillance continues, possible dry runs and rehearsalsDeployment and attack – target identificationEscape and evasion
26Surveillance Detection Target Selection Terrorist seek to create fear, demoralizetheir victims, and gain support for theircause through successful attacks.Terrorist will normally seek the highestprofile soft target available to maximizethe odds of a successful attack.
27Surveillance Detection Hard Target vs. Soft Target What defines the difference to a terrorist:Use of security systems, policies & proceduresPredictability of target – How routine is the targets path of travel?Awareness of target – Are they high observant? Are they aware of their surroundings?Mental preparation – Is target prepared to react to an attack?
28Surveillance Detection Choke Points Many attacks occur while victims are in transitChoke Points – Areas you must pass through near residence and workIdeal Attack Sites:a. Place where victim can be controlled with avenues of escapeb. A location that is well suited for surveillance, and abilityto blend into the environment.
29Surveillance Detection Choke Points Many attacks occur while victims are in transitChoke Points – Areas you must pass through near residence and workIdeal Attack Sites:- Place where victim can be controlled with avenues of escape- A location that is well suited for surveillance, and abilityto blend into the environment.
30Surveillance Detection Examine you Personal Choke Points May be “self made” if time and place is predictable – DON’T establish routine patternsIdentify choke points – VARY travel timesADD stops or errands to increase unpredictabilityExplore variable work schedule
31Surveillance Detection Techniques Be Alert – Study detail, especially at choke pointsKnow what is normal / not normalBe able to provide useful information to your local Regional Security Officer at you Embassy or to local law enforcement (if local LE is to be trusted) – use descriptive terms for vehicle and people.
32Surveillance Detection Descriptors - People GenderRaceHeight – 2 inch incrementsAge – 5 year incrementsWeight – 10 pound incrementsHair color/style, clothing, jewelryDistinguishing featuresCompare person to a popular person such as actor.
33Surveillance Detection Descriptors - Vehicles ColorBody style and size – compact / full size / vanNumber of doorsMake, model, yearLicense number and originHow many occupantsPeculiarities – damage / decals / bumper stickers , custom features
34Surveillance Detection Behavioral Cues Target Fixation – Persons who pay undue attention to you, photographing or appear to be taking notes of your actions. This includes time checking.
35Surveillance Detection Persons or Vehicles Persons / vehicles with no purposefor being thereBroken down vehicles / taxis /vendors / service personnelIllegally parked vehicles or facingwrong way on one-way streets
36Surveillance Detection Correlations Repeated sightings – same person or vehicle at different locationsRule of Three- If it is the third time you see same person or vehicle, report it immediately, better to be mistaken than taken.Report anything suspicious – it may correlate with something reported by another person.
37Surveillance Detection If You Suspect Surveillance Conceal you suspicions – do not confrontDiscreetly observe the person or vehicle to obtain a descriptionTry to confirm surveillancea. Make casual eye contact – reaction?b. Change your speed /direction (safely) – walking or driving.Contact Embassy or Local Law Enforcement !!
38Surveillance Detection Avoid Being a Target Maintain a low profileVary your times and routes when possibleBe aware and alert – especially in choke pointsAllow yourself room to maneuverBe prepared to react – have a planLearn escape routes and locations of safe havens.
39Surveillance Detection Attack Recognition Signs Focus on the choke pointsTarget identification – strong interest in youStrange / unusual behaviorSomething / someone slowing or stopping you, blocking vehicleIndividuals approaching you rapidlyTransition to weapons
40Surveillance Detection Response to an Attack If you spot or think you spot a potential attack ahead – do not go there!Disrupt attack – Change route, scream out loud, pull alarm.Create space between you and threatMove quicklyBreak traffic laws – only if necessary for life safetyGet off the X – go to a safe haven or populated areaContact your Embassy or local Law EnforcementMOVE YOUR FEET, DOING SOMETHING IS BETTER THAN NOTHING!