Muutke küpsiste eelistusi

Understanding Personal Security and Risk: A Guide for Business Travelers [Pehme köide]

(DefenseReport, Houston, Texas, USA)
  • Formaat: Paperback / softback, 266 pages, kõrgus x laius: 234x156 mm, kaal: 530 g, 10 Illustrations, black and white
  • Ilmumisaeg: 01-Mar-2017
  • Kirjastus: Routledge
  • ISBN-10: 1498765785
  • ISBN-13: 9781498765787
Teised raamatud teemal:
  • Formaat: Paperback / softback, 266 pages, kõrgus x laius: 234x156 mm, kaal: 530 g, 10 Illustrations, black and white
  • Ilmumisaeg: 01-Mar-2017
  • Kirjastus: Routledge
  • ISBN-10: 1498765785
  • ISBN-13: 9781498765787
Teised raamatud teemal:
Uniting broad, time-tested security principles and the authors 35-plus years of experience with international security, intelligence, and foreign affairs, Understanding Personal Security: A Guide for Business Travelers offers a detailed yet practical framework on which to develop personal security awareness and training programs. As a critical resource for any travelers who may need to make fast, smart judgements in high-risk environments, this book helps readers analyze threats, threat actors, and the common adversarial characteristics, as well as the function of risk as a differentiating principle. This versatile text blends abstract organizing principles with street honed instincts, becoming equally valuable to security managers with previous experience and those corporate or non-profit organizations with employees in developing nations.

Arvustused

"[ W]hy choose this [ book]? Two reasons at least. First, Goslin has been there and done that, and he relates it and draws sensible and useful conclusions. For instance, he recalls the two 'genuine in-flight emergencies' that he has experienced. Second, from start to finish he puts his finger on what he calls 'the red-headed stepchild of the overall discipline of security', namely personal security training and awareness. He states the obvious, which does want stating: that personal security comes down to you, the traveller, and no other; tracking devices are all very well, but if you are the 'tip of the spear' of business development, in some obscure part of the world, you have to apply thought, beyond that 45 minute briefing you had before setting off from corporate security (or HR). Third, something else Goslin shrewdly points out; the world is 'increasingly insecure': for instance, kidnappers may go after mid-level employees, for smaller ransoms, rather than take longer to get millions for the senior exec capturedit takes homework, watching the terrain, and being observant for your self-defence." Professional Security Magazine Online, Summer 2018

"When you start using the information in a book you're reviewing before you even finish reading it, that's a sign the book has great value. That is what happened with Understanding Personal Security and Risk by Charles E. Goslin." -- Terry V. Culver, CPP, CMAS, Security Management, June 2018

Acknowledgments xvii
Author xix
Introduction xxi
Chapter 1 Important Personal Security Concepts
1(6)
Introduction
1(1)
Concept of Effectiveness
1(1)
Concepts of Threat, Vulnerability, and Risk
2(1)
Concept of Time
3(1)
Committing a Security Plan to Memory
4(1)
Threat Agents and Threat Actors
5(2)
Chapter 2 Personal Security Principles
7(38)
Introduction
7(1)
Principle of Preparation
7(21)
Preparing for Contingencies
8(1)
Developing a Threat Profile: Preparation for Incidents
8(3)
Guidebooks as a Resource
11(1)
Geographical Memorization: Preparation for Movement
11(1)
Physical and Mental Health
12(1)
Physical Heath: Medical Necessities
13(5)
Physical Health: Health Insurance
18(3)
Mental Health: Engineering Peace of Mind: Technical Communication Preparation
21(4)
Clothing and Appearance Preparation
25(1)
Documentation
25(1)
Packing for Mobility and Portability
26(1)
Limiting the Luggage Load
27(1)
Spreading Your Risk
27(1)
Preparing Delay Measure Tools: Throw-Down Wallet
28(1)
Principle of Detection
28(4)
Principle of Deterrence
32(2)
Principle of Delay
34(2)
Principle of Defense
36(6)
Reality of Confrontation
36(1)
Delivering Effective Violence (Fighting)
37(4)
Protecting Yourself from Blows
41(1)
Getting Out of Holds
41(1)
Keep It Simple
42(1)
Selected Threat Actor Profile: Street Gangsters
42(1)
References
43(1)
Endnote
44(1)
Chapter 3 When Travel Plans Go Sideways
45(18)
Introduction
45(1)
Arrival at the Airport
46(4)
At Arrivals
46(1)
Arrival Hall: Public Space
47(3)
On the Road: Checkpoints and Roadblocks
50(9)
General Guidelines for Roadblocks
51(1)
Preparation
51(1)
Communications
51(1)
Managing Your Team
51(1)
Approach and Interaction
52(1)
Police Checkpoints
52(1)
Police in Conflict Zones
53(1)
Police in Criminal-Controlled Regions
53(1)
Military or Paramilitary Checkpoints in Conflict Zone
54(1)
Standard Military Checkpoint
55(1)
Paramilitary, Militia, or Flying Checkpoints
55(1)
Criminal Roadblocks
56(3)
Selected Threat Actor Profiles: Roadblocks and Military, Insurgents, and Police
59(2)
Military Roadblocks
59(1)
Insurgent Roadblocks
60(1)
Endnotes
61(2)
Chapter 4 Kidnapping
63(46)
Introduction
63(2)
Classifying Types of Kidnap/Abduction Operations
65(3)
Type 1 Money but No Politics
65(1)
Type 2 No Money, No Politics
66(1)
Type 3 Money and Politics
67(1)
Type 4 Politics, No Money
67(1)
Tip of the Iceberg: Keeping Kidnap Threat Trends in Perspective
68(16)
Top Severe Kidnap Threat Countries for 2016
69(3)
Regional Summary
72(1)
Latin America
72(2)
Africa
74(1)
Asia
75(1)
International Patterns and Trends in Kidnapping
76(1)
The Gap between Rich and Poor and Failed States
77(1)
The Collapse of Communism and the End of the Cold War
77(1)
A Weak Ethical Environment
77(1)
Arab "Spring," Arab "Winter," and Islamic Extremism
77(1)
A Closer Look: Kidnap for Ransom
78(1)
Target Selection Development Phase
79(1)
Intelligence Gathering Operation
80(1)
Route Analysis, Snatch Location Selection, and Logistics
80(1)
Abduction Operation
81(1)
Abduction Case Study: Victor Cortez
82(1)
Negotiation
83(1)
Different Types of Kidnapping Operations
84(1)
Political Abduction
84(1)
Express Kidnap
84(1)
Virtual Kidnap
85(1)
Tiger Kidnap
85(1)
Measures to Counter the Kidnap Threat
85(8)
Preparation Principle: Advance Planning Measures Specific to Kidnap
85(3)
Detection Principle: Countersurveillance
88(1)
Principle of Deterrence: Crafting a Low, Unpredictable Profile
89(2)
Principle of Delay: Slowing Down the Abduction
91(1)
Principle of Defense: Survival Strategies in Captivity
91(2)
Recovering from Kidnap
93(1)
Executive Protection: Key Elements of a Program
94(9)
Program Development: Step 1 Risk Assessment
95(1)
Program Development: Step 2 Protection Plan
96(1)
Program Development: Step 3 Stakeholder Engagement: The Human Factor
97(1)
Program Development: Step 4 Planning Process Document
98(4)
Program Development: Step 5 Implementation
102(1)
Selected Threat Actor Profile: The Mind-Set of a Kidnapper
103(1)
References
104(3)
Endnotes
107(2)
Chapter 5 Patterns of Threat in the Environment
109(28)
Introduction
109(1)
Cover of Darkness
110(1)
Alcohol, Drugs, and the Environment
111(2)
Broken Windows
113(16)
Gangs and Gang Activity
115(14)
Natural Disasters
129(3)
Civil Disorder and Rioting
132(2)
References
134(1)
Endnote
135(2)
Chapter 6 Hotel and Residential Security
137(18)
Introduction
137(3)
Considerations when Choosing a Hotel
140(8)
Location and Layout Trumps Amenities, Convenience, and Proximity
140(2)
Realistic Expectations
142(1)
Hotel Arrival: Deterrence and Delay
143(1)
Standoff and Perimeter Security
143(1)
Screening
143(1)
Arrival to Check-In: Moving from Public to Private Space
144(1)
Communications: The Need to Know
144(1)
Room Selection
144(1)
Moving from Public to Private Space: Front Desk to Room
145(1)
In the Room
146(1)
At the Room Entrance
146(1)
Initial Entry to the Room
146(1)
While in the Room
146(1)
In the Event of a Security Incident or a Fire
147(1)
In and around the Hotel
148(1)
Residential Security
148(5)
Residence Selection: Security Preparation and Planning Measures
149(1)
Perimeter: Security Detection and Delay
149(1)
Gate Guards: Deterrence, Detection, Delay, and Response
149(1)
Canines
150(1)
Exterior Lighting and Decorative Shrubs: Detection and Deterrence
150(1)
Ground Floor Windows and Doors and Exterior: Security Delay Measures
151(1)
Inside the Residence: Layering Your Defenses
151(1)
Detection
151(1)
Deterrence
151(1)
Delay: Importance of Establishing a Safe Room
152(1)
Respond
152(1)
Selected Threat Actor Profiles: Pickpockets, Thieves, and the World's Oldest Profession
153(1)
Endnotes
154(1)
Chapter 7 Cybersecurity on the Road
155(14)
Introduction
155(1)
Darkhotel Threat
155(1)
Foreign Intelligence Service Threat
156(8)
The Honey Trap Threat
157(2)
Technical Threat
159(1)
Vulnerabilities
159(1)
Personal Cybersecurity Program for the Business Traveler
160(1)
Established Secure Baseline of Information Security
160(1)
Preparation
161(1)
Detection
162(1)
Delay
162(1)
Defense
163(1)
Response
163(1)
Identity Theft Abroad
164(3)
References
167(1)
Endnotes
168(1)
Chapter 8 Shopping Malls, Sports Stadiums, Theaters, etc.: Soft Targets
169(14)
Introduction
169(1)
Preparation
170(2)
Detection
172(1)
Considerations about the Threat
173(1)
Response Countermeasure 1: Active Shooters
174(3)
Run
175(1)
Chokepoints and Routes
175(1)
Hide
176(1)
Fight
176(1)
Recovery
177(1)
Response Countermeasure 2: Suicide Bomber
177(2)
Preattack Phase
177(1)
Detonation Phase
178(1)
Postdetonation Phase
178(1)
Selected Threat Actor Profiles: The Jihadist Suicide Bomber
179(2)
References
181(1)
Endnote
182(1)
Chapter 9 Risk Assessment for Personal Security
183(28)
Introduction
183(1)
Step 1 Identify Assets and Impact of Loss
184(6)
Identify Undesirable Events and Anticipated Impacts
185(1)
Value/Prioritize Assets Based on Consequence of Loss
185(1)
Impact on Business or Mission Function
186(3)
Impact on Health (Sickness, Injury, and Death)
189(1)
Impact on Reputation
189(1)
Impact on Recoverability
189(1)
Step 2 Identify and Characterize the Threat to Specific Assets
190(7)
Identify Threat Categories and Potential Adversaries
190(1)
Assess Degree of Threat
191(1)
Intent and Motivation
191(3)
Skill and Workforce Capability of the Adversary
194(1)
Determine the Logistic Capability of the Adversary
194(1)
Determine Frequency of Threat-Related Incidents Based on Historical Data
194(1)
Determine the Favorability of the Operational Environment
195(2)
Step 3 Identify and Characterize Vulnerabilities
197(6)
Identify Vulnerability Vectors with Public Knowledge (Recurring, Nonrecurring, and Time)
200(1)
Predictability (Itinerary, Movement, and Accommodation)
201(1)
Physical Protection
201(1)
Accessibility
202(1)
Proximity (Collateral Damage Potential)
202(1)
Step 4 Assess Risks and Determine Priorities for you and Your Team's Protection
203(3)
Estimate the Degree of Impact Relative to Yourself or Your Team Members
203(1)
Estimate the Likelihood of Attack by a Potential Adversary
203(3)
Estimate the Likelihood That a Specific Vulnerability Will Be Exploited
206(1)
Determine the Relative Degree of Risk
206(1)
Step 5 Identify Unacceptable Risks and Determine Risk Mitigation Priorities
206(2)
Identify the Benefits and Costs of the Countermeasures
207(1)
Identify the Cost of the Countermeasures
207(1)
Reference
208(1)
Endnote
209(2)
Chapter 10 Personal Security and Transportation: Securing Your Movement
211(24)
Introduction
211(1)
By Foot
211(2)
Ground Transportation: Vehicle and Rail
213(16)
Bicycle
213(1)
General Bike-Locking Principles
214(1)
How to Lock the Bike
215(1)
Motorbike Security
215(1)
Rickshaws
216(1)
Taxis
217(3)
Buses
220(1)
Trains
221(1)
Rental Car and Driving
222(1)
Safety and Security Risk Considerations
223(6)
Air Transportation
229(4)
Prepacking for Security and Safety
229(1)
At Security Screening
230(1)
In the Terminal
230(1)
On the Plane
231(1)
Emergency Situations
232(1)
References
233(1)
Endnotes
234(1)
Chapter 11 Managing Your Team's Personal Security
235(10)
Introduction
235(1)
Authority
236(1)
Communications
236(1)
The Team Briefing
237(1)
On the Ground
238(1)
Roadblock Protocol
239(1)
At the Hotel
240(1)
Managing Crisis Situations
240(5)
Principle of Planning
241(1)
Loss of Mobility
241(1)
Loss of Command and Control: Criticality of Communications
242(1)
Loss of Security and Safety
243(1)
Postcrisis Considerations
243(2)
Conclusion 245(2)
Index 247
Charles Goslin is a retired CIA operations officer who served throughout the world in a wide range of capacities that bridged covert technical and HUMINT operations. He continues actively consulting in retirement on international intelligence, security and risk issues faced by multinational corporations operating in some of the worlds most hostile regions. Charles experience offers unique value for the business traveler that must, out of necessity, venture into "Indian Country." His perspective is one drawn from years working in the trenches of the third-world, rather than the relative comfort of a Washington office. Charles has authored and published numerous white papers on the security threat and business risk issues, and lectures regularly on terrorist radicalization and the threat of jihadist groups to Europe and the U.S. He has worked abroad in India, Africa, Central & South America, Europe and the Middle East with personal experience in crisis management and evacuation of facilities and personnel on numerous occasions. His expertise has been solicited by national media, both broadcast and print.