April 03

Why do ETS only utilize Tier One Operators for VIP Protection? | ETS Risk Management

Operators cost millions of dollars to train but their true value comes from years of real-world assignments that shape and sharpen their skills, networks and instincts. Their proven unique experience facilitating secure travel and lifestyle in all environments without fanfare is their understated asset. VIPs chaperoned by world-class tier one operators can safely and efficiently move on foreign turf while remaining under the radar. Low profile, discreet and respectful, the former Special Forces operator is a proven and powerful enabler. A conscientious operator able to read the environment and quietly get the job done is an invaluable part of a VIP protection team.

April 03

Protective Surveillance White Paper | ETS Risk Management

Identifying threats early is vital to ensure time to react. If one has time to react then the chances of a favorable outcome are increased dramatically. Any aggressive force normally has the advantage of surprise. The attack occurs on their terms. Very few aggressors will attack if they don’t feel they have the upper hand, they do so at a time of their choosing, and probably after extensive planning and preparation.

The assassination of Denis N. Voronenkov in March 2017, a former Russian lawmaker who was killed in Kiev in a widely publicized killing, identifies what happens when Media Security does not have time to react. Denis Voronenkov, who’d been a Communist member of Russia’s lower legislative house before he left, was fatally shot outside a hotel in broad daylight. The assassin walked up behind the target and his personal security, then shot Voronenkov, after which a gunfight ensued and both Assassin and security were shot, and the VIP left dead.

There is an increased chance that a PST would have identified the threat early, communicated with the CPT and been able to pre-empt the attack, or intercept.

April 03

Cyber Security Risk Management | ETS Risk Management

Preparing for the worse is part of every security professional’s repertoire especially when it comes to planning for failure. This three-part series is designed to enhance understanding of how kidnap and ransom negotiations work and your role in the event the unthinkable happens. Cyber Security leaders with a significant global high-risk footprint know that a kidnapping may not be a question of “if” but a question of “when”. It may happen when you are not directly responsible for covering your employee or their family and therefore least able to prevent it – when they are alone and most vulnerable. Learning what to expect in those first hours of an abduction will help you avoid becoming a bystander when your leadership is most needed.

April 03

What are the Armored Vehicle Ratings? | ETS Risk Management

Are you considering utilizing an armored vehicle? Perhaps you are heading to an area of increased risk and want to understand more about Armored Vehicles, or are considering Armored Vehicle Rental.

There are two main primary standards used to rate armor – The NIJ and the EN standard.

The NIJ (the U.S body) is considered the world leader for ballistic testing for armor, they perform a full range of tests and provide details of the results in their armor standards. These show the range of protection offered by the different pieces of armor tested, from low powered handguns, up to armor piercing rifle rounds. They provide 8 classifications of protection known as threat levels which are Class I, IIA, II, IIIA, III, IV, V & VI.


April 03

Our Executive Is Missing: Kidnap and Ransom Basics for Security Professionals (Part Iii) | ETS Risk Management


A company should prepare to expend a considerable amount of time and resources supporting, advising and protecting the victim family. First impressions are critical, and a company should give serious consideration as to which executive protection level official will make the initial in-person notification, and who will be assigned as the full-time family liaison for the duration of the incident. The victim’s family will feel isolated, perceive that information is being filtered, and that the company is not doing enough to obtain their loved one’s release. These sentiments are quite common and understandable. It is essential for the company to form a united front with the family and to provide them with realistic assessments and genuine assurances that they are equal players at the table.

As soon as possible there are two areas to address with the family. The first area is how to handle contact with the captors. The second topic involves the best approach to media inquiries. Contact from the captors with the family is very common and should be expected. Captors realize the emotional impact they can have when they manipulate victim family against victim company. They know the family can pressure the company to quickly acquiesce to the captor’s demands. A company that provides the victim family with concrete guidelines can minimize the likelihood of orchestrated manipulation. Additionally, the family’s confidence in the company’s knowledge and competence increases when they can anticipate the adversaries’ strategy.


March 28

Why do ETS only utilize Tier One Operators for VIP Protection? | ETS Risk Management

Operators cost millions of dollars to train but their true value comes from years of real-world assignments that shape and sharpen their skills, networks and instincts. Their proven unique experience facilitating secure travel and lifestyle in all environments without fanfare is their understated asset. VIPs chaperoned by world-class tier one operators can safely and efficiently move on foreign turf while remaining under the radar. Low profile, discreet and respectful, the former Special Forces operator is a proven and powerful enabler. A conscientious operator able to read the environment and quietly get the job done is an invaluable part of a VIP protection team.

March 28

Insider Threat A Beginners Guide | ETS Risk Management

What your company spent years to develop can be lost in an instant at the hands of one bad intentioned employee. The statistics on employee theft of intellectual property (IP) paint a dark portrait of what employees do when disgruntled, moving on, or stockpiling for a rainy day. William Evanina, the U.S. government’s National Counterintelligence Executive in the Office of the Director of National Intelligence says, “As a corporate leader, the single most important investment in protecting your proprietary information and sensitive trade secrets is developing a viable and enterprise-wide insider threat programs”.

To paraphrase the well-worn mantra on hacking and apply it to the pandemic of Insider Threat: There are two types of companies, those whose employees have already stolen IP, and those who simply don’t know it yet.  No matter where your company is along its journey toward an effective insider threat program, success or failure is measured by the last harmful egress of research, formulas, algorithms,  strategies, service manuals, or other critical business information (CBI). Whether your effort to detect, deter, and prevent CBI loss has become an industry model or is still a nascent vision, three common components can help build a new plan or help review and adapt a mature program.


March 28

Workplace Violence, A Stewardship Model Solution | ETS Risk Management

Reporting methods should be communicated to employees in numerous ways. These include posters in break-rooms, email reminders, and intranet home page links to a reporting tool. Small banks in particular, where “everybody knows everyone,” might want to offer an external contact number for reporting. Perhaps a community mental health center or your Employee Assistance Program vendor can partner in this endeavor.

Once employees report a concern, the ball is in management’s court. An effective WPV program includes a strong protocol to address reporting in a professional, credible, and timely manner. If employees perceive that their reports are not taken seriously, you may never receive another report.

Assemble a workplace violence Programs council including your HR leader, legal advisor, and security director, and preferably, a mental-health professional. Keep the team contact numbers in your smartphone to quickly convene a meeting.

March 27

Protective Surveillance White Paper | ETS Risk Management

The assassination of Denis N. Voronenkov in March 2017, a former Russian lawmaker who was killed in Kiev in a widely publicized killing, identifies what happens when Media Security does not have time to react. Denis Voronenkov, who’d been a Communist member of Russia’s lower legislative house before he left, was fatally shot outside a hotel in broad daylight. The assassin walked up behind the target and his personal security, then shot Voronenkov, after which a gunfight ensued and both Assassin and security were shot, and the VIP left dead.

There is an increased chance that a PST would have identified the threat early, communicated with the CPT and been able to pre-empt the attack, or intercept.


March 27

Our Executive is missing: Kidnap and Ransom Basics for Security Professionals – Part II | ETS Risk Management

One reason to seek the expertise of a K&R professional is domain knowledge regarding ransom. We are all familiar with the real estate mantra, “location, location, location”. Similarly, ransom demands are contingent upon the adversaries’ expectations, or the “going rate”, and a major determinant of that rate is location. A K&R expert will help you understand the most recent and differing ransom structures for places like Nigeria, Colombia and Mexico Executive Protection Services. Also obtain and assess intelligence regarding the captor’s previous kidnap track record, including the credibility of their threats and their propensity for violence, and what ransom amounts have been paid by western victims’ families and companies in that location. Such intelligence is instrumental in estimating the final amount you expect to pay the captors to secure the release of the hostage. Another key factor in deriving this payment figure is of course the amount of funds available and/or agreeable to be paid. Statistics show that a large majority of captors agree to approximately 10 percent of their initial ransom demand.

March 22

Why Is Cyber Security Important For Security| ETS Risk Management

Cyber security advances and arrangements are developing because of the changing risk scene, where dangers are getting to be more astute and harming. In the present associated wellbeing condition, cyber security is never again an alternative or idea in retrospect though it is a basic vital resource that is being tended to by each association.

March 22

Will I Like Cyber Security | ETS Risk Management

The worldwide medicinal services cyber security advertise is fragmented based on end client, district, and arrangement type. By district, the worldwide human services cyber security advertise is separated into North America, Europe, Asia Pacific, and Rest of the World.

March 22

Understand Armored Vehicle Rental| ETS Risk Management


 The class most likely to be found utilized and available on LATAM armored vehicles for rent is Class NIJ IIIA/ and EN standard B4. This will defeat .44 Magnum rounds, 9mm, 12 gauge shotguns, and lesser threats.

Higher rated armor is available though always at a premium and is often dedicated to those at an increased level of risk. Class NIJ III/B5 is capable of defeating 7.62 rounds from a Kalashnikov rifle at 5 meters. The ratings then go up to counter significant caliber threats.


March 20

Explore Secure Launches New Design for Online Travel Safety Training | ETS Risk Management

Explore Secure®, a travel safety training service [...]

Explore Secure Launches New Design for Online Travel Safety Training

Explore Secure®, a travel safety training service managed by former UK Elite Counter-Terrorism personnel have amended their online travel security content to decrease the time it takes to complete, while still providing the same high level of content.

Both of Explore Secure’s travel safety training products will still contain the full animated modules. The company has a Business Travel Safety Briefing for Corporates, and a Student travel safety briefing aimed primarily at scholastic organizations, gap year travelers and study abroad students. Each now more efficient for the user, able to navigate through the modules within 30 to 35 minutes.

“Corporates, organizations and individual travelers have limited time to dedicate to travel safety training,” said Mark Deane, CEO of ETS Risk Management, the company that owns Explore Secure® “Our product now helps provide the same high level of advice and guidance to travelers, just delivering it more efficiently.”

Organizations are increasingly aware of their duty of care responsibilities to all employees, volunteers, and students.

The Explore Secure training now allows users to carry out training with the least negative impact on their schedule.

ETS is dedicated to improving the health, safety, and security of all travelers. Based on the fact that simple, easy to learn thought processes and methodology can significantly increase the safety and security of all travelers throughout the globe. The Explore Secure®briefings are specifically designed to teach individuals and groups how to identify threats early to avoid danger and minimize risk, and if the worse case scenario ever does occur they are prepared to react in a positive manner to increase chances of a positive outcome. They have proven countless times that just 45 minutes spent learning the basics of personal safety abroad can significantly increase the chances of staying safe and avoiding danger.

March 20

Duty of Care for Business Travel – Why Secure Transportation is Critical | ETS Risk Management

The need for employers to meet their duty of care requirements to employees is a complex process to navigate for many organizations. Understanding what measures you can take to manage this level of risk remains a considerable challenge. Incorporating the use of secure executive transportation into your travel risk management plans is a prudent move to reduce this risk and keep your people safe. Now, more than ever the need arises as to how best to meet this legal obligation for staff and employees who are traveling overseas on company business. The constituent groups this affects are varied, ranging from executives, accompanying spouses and dependents, students, teachers, volunteer groups, contractors – the list goes on.