Results-Focused Solutions

Contact Us

Risk Management & Assessment

Risk Management

Risk Mitigation – I² Security Group provides practical risk management solutions to close security gaps and to ensure operational continuity in the event of a catastrophic event. I² Security Group’s with our clients to implement recommendations and to oversee the integration of security systems, protocols, and training programs. This includes security hardware systems and process, operational systems, emergency protocols, personnel training programs, and continuity planning.

Training Evaluation – A team of I² Security Group training specialists will evaluate our client’s current homeland security / state or country-wide and emergency response training program and will recommend changes and enhancement that will align with current, credible threat and the evolving realities of terrorism.

I² Security Group programs, including: Executive Safety and Personnel Emergency Response Training, Tabletop and Field Exercises, Red Teaming, Team Building, and Pre-Deployment Preparation for Personnel going to At-Risk Environments)

Business Continuity Planning

Most executive believe it is not a question of “if” but “when” another terrorist attack will occur. In light of this heightened state of threat awareness, decision-makers are faced with a new reality: proactive counter-terrorism planning. Business continuity planning is now an essential part of enterprise risk management. These plans may determine operational continuity and corporate survival following a terrorist attack. In the recent past, continuity planning was typically limited to the IT department. Today, corporations have significantly expanded continuity planning in areas of facilities, staff, production capabilities and other resources.

Scenario planning is a critical technique for intelligence analysis and continuity planning. Most business continuity planners deal with traditional threats. Threats like power or computer outages, natural disasters, labor unrest and network failures were all common scenarios. But today, with the threat of biological attacks, weapons of mass destruction, car bombs, suicide bombers and other terrorist acts, corporate planners are finding themselves in unfamiliar territory. The complexity of these new events, challenge even the most senior planners.

The International Association of Counter-terrorism Professionals (IACSP) scenario-based intelligence analysis is critical for counter-terrorism planning. Scenario planning involves identifying trends and characteristics, and exploring the implications of a given event. The logical scenario planning process is designed to stimulate creative thought, collect and analyze information and generate a series of scenarios. Scenario planning is not about predicting the future. It is about exploring the future. If you are aware of what could happen, you are more likely to be able to deal with it. As different trends are chosen and different combinations of forecast levels are combined, a whole new spectrum of possibilities can be identified. I² Security Group will help you achieve that.

Crisis Management & Consulting

Crisis Management

I² Security Group has developed instruction on how to recognize the indicators of a criminal / terrorist incident or threat and understand the methods of how to properly deploy and respond to the crisis and if necessary preserve evidence that could be used to convict the responsible parties are also areas of specialty for I² Security Group.

I² Security Group approaches this area from a holistic direction that includes communications enhancement, incident reporting management, Bio Tech, Chemical and order hazardous means of terror, and not excluding Cyber Terrorism areas as well.

Kidnap Response Negotiations

Kidnap Response

The main objection to negotiation with terrorists is that it encourages them to repeat their tactics. But it is not negotiation per se that encourages terrorism, rather the degree to which terrorists are able to achieve their demands by negotiation.

There are different types of terrorists, according to their reasons and goals for using terrorism. Contingent terrorists, such as kidnappers and hostage takers, do seek negotiations. Absolute terrorists, such as suicide bombers, view any negotiation as a betrayal of their very raison d’être.

Some absolute terrorists may become open to discussion and eventually moderation of their means and ultimately even of their ends. The challenge of negotiation is to move total absolutes into conditionals, and to work on contingent terrorists to either reduce or change their terms.

Effective negotiations can begin when the parties perceive themselves to be in a mutually hurting stalemate and see a way out. Negotiators must maintain pressure (stalemate) while offering a way out, thereby showing terrorists there is something to gain from negotiation.

Negotiators do not negotiate belief systems. They should help terrorists develop alternative means: changing terrorist ends can be tackled only over the much longer term.

Negotiation with contingent terrorists is a short-term tactic; negotiation with absolute terrorists is a long-term strategy. Patience and persistence will prove key to dealing with both contingent and absolute terrorists.

The negotiator needs to offer the conditional absolute terrorist concessions to his demands as the payment for abandoning his violent terrorism, not concessions to the pressure of terrorism itself. If the negotiator makes concessions to the terrorist part of the negotiation process, so too must the terrorist. Even the absolute terrorist organizer does have something to offer as payment — his choice of terrorist tactics. I² Security Group will train you and you organization on how to look out for potential kidnap; if and when a kidnap is successful, how to conduct yourself in order to maintain safety and be able to come out alive.

I² Security Group also will help you know and understand your terrorist or kidnapper, the types of terrorist or kidnappers at issue. I² Security Group also will help you understand the task of negotiations – the official and the unofficial negotiator.

Bio Terrorism Consulting

Bio Terrorism

I² Security Group conducts training in the recognition, decontamination and transfer of exposed victims as well as the prevention of injuries from these agents.  We have some of the most qualified Combat Medical Trainers in world that can be available to your agency to bring your people up to speed on the current Biological risk and response.

I² Security Group specializes on Biological, Nuclear, Incendiary, Chemical and Explosives used on terror from Emergency Response, Aviation and Agriterrorism to Kidnappings and Cyber Terrorism and Computer Forensics and Vehicle Borne Explosive Devices perspective.

Public Order Management

Public Order Management

Police actions involving large-scale maintenance of public order adopt a different position from other items of police work, because of its large impact, the specific knowledge and skills required and the situation of it often being a secondary task for the officials involved. Large and exceptional police actions a part of the management of conflicts and crises should be subject to quality control, just like all other aspects of police work. In his 1982 article about the police action in Almelo, Peter IJzerman observed that “we have  unfortunately  not yet succeeded in meeting the urgent need for a national evaluation platform; there is no institution for giving recommendations or achieving a centralized approach, but a possibility to exchange experiences, evaluate the effects of particular tactics and techniques and so forth. Each large-scale action is as yet treated too much as a one-off incident, so that the fact is glossed over to a significant degree that the closedown phase of one incident is really also the preparatory phase of the next one”. In the meantime, steps have been taken to fulfill this old requirement. In a recommendation to the Board of Chief Commissioners for the establishment of a center of expertise for the management of conflicts and crises it is worded as follows:

“Concerning learning to be prepared for large-scale and exceptional police actions, there is a requirement for the following (in addition to already existing training) within the police:

  • Support during (self-) evaluation;
  • Testing and advice between institutions;
  • Widely accepted criteria with respect to professionalism;
  • Exchange of expertise across regional boundaries;
  • Targeted strategic information with respect to the effects of social developments and policy decisions;
  • The development of instruments for evaluation, prevention, analysis and scaling up.”

I² Security Group have developed a very robust program for Law enforcement agencies and organizations that will greatly enhance and promote their successes in the spheres of public order management.

Conflict Resolution & Management

Conflict Resolution Manageement

Conflict is a natural part of life. Dealing with it in an effective and meaningful way is the main difference between a healthy relationship and an unhealthy one. This principle is no different when talking about organizations. While conflict can be difficult and uncomfortable, the end result after collaborating or compromising is usually a better decision. Boards, organizations and individuals who get along all the time and have no conflict are necessarily not the most effective group. At the same time, groups embroiled in conflict typically are not effective..

Before beginning to discuss conflict resolution, we must first agree that we need to accept two principles.

  1. To commit to a decision making process that always keeps the best interests of the organization in mind.
  2. When disagreement occurs, learn to respectively disagree.

One key to any nation or organization is having a unifying vision that everyone involved buy’s into. Next, the nation or organization should spend the time to create a mission statement that articulates the vision. It is the responsibility of the leadership to educate everyone and the interested public about this mission. Finally, nation or organization needs to be certain to recruit leaders who not only understand the mission, but those who are also committed to supporting the mission. This, unfortunately, is where most problems begin. Ninety-eight percent of leaders in organizations have good intentions and are all “trainable.” But the other two percent are usually the problem and can be the most destructive members of the team. This two percent can be characterized as serving for the “power or authority” that they feel comes from the position. They usually have hidden agendas and unfortunately cause 98 percent of the problems and consume 98 percent of the board’s time. This is the chief reason to have a clear process for dealing with these caustic people and the conflict that comes along with them. If ignored and not dealt with, this type of conflict can destroy organizations.

Conflict resolution is a positive process whereby individuals resolve issues in an informal or formal atmosphere, or where issues are resolved as part of the ongoing interaction between individuals. Having good communication is imperative for your club board to positively work through normal day to day conflicts and ultimately be able to avoid any formal grievances or conflict resolution.

I² Security Group have researched and effected a service and training process to assist nations, organizations and its leadership, and individuals on ways and means of preventing conflict of interest, and dealing effectively with conflict and managing one when it occurs.

Forensic Support

Under Construction

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Emergency Response Solutions

Emergency Response

The ill-effects of disasters can be linked to inadequate planning – specifically in regards to incorporating existing economic, social, and health impacts that define a community’s daily reality into the preparedness equation. Second, through the use of proper community inclusion and trust building throughout every facet of the emergency planning model (preparedness, mitigation, response, and recovery), many post-emergency consequences could be better predicted and responded to in a manner that strengthens community self-sufficiency and encourages resiliency. Translating both of these important components into modern emergency management practice will achieve a robust and successful model of national preparedness and resiliency.

There are certainly examples in other disaster response analyses where emergency management agencies have successfully engaged community organizations in the planning process. Often these included community health promoters, community activists, organizers, and others who have built community trust, are trained to understand community dynamics, and are best situated to implement an effective response through their already established social networks.

I² Security Group has combined several basic responder courses from United States FEMA, DOT, U.S. Army, and segments of the National Fire Academy course to develop an easy to understand training course designed for police, fire, military, EOD, EMS, investigators and corporate security specialist to prepare them to safely and more efficiently respond to a crisis or terrorist incident. This self- guided course utilizes Power Point presentations to train the law enforcement; Emergency and other stake holders’ responders on a more dynamic approach to emergency management. Portions of this power point training course have been utilized at many US municipal Law enforcement agencies as well as many Public Safety Training Centers to train International Military and Law Enforcement officers.

I² Security Group programs have also been used to train Security Professionals at International training conferences such as ASIS International, Counter Terrorism Expo, and other Security and Terrorism training seminars. We have expanded the course from the initial 2 power points that were designed to provide response training to Biological, Nuclear, Incendiary, Chemical and Explosives to 40 Power Points, covering all areas of terror from Emergency Response, Aviation and Agriterrorism to Kidnappings and Cyber Terrorism and Computer Forensics and Vehicle Borne Explosive Devices. Trainees for the training are provided with lots of books and publications on terrorism as well as multiple Power Point presentations addressing most types of terrorist attacks. These Power Points and materials may be used as study materials and reference materials as well. Using this training you can learn the correct response to almost any natural or terrorist incident.

Contact I² Security Group for more details.

Back to top