The Ackerman Group provides a variety of services to safeguard our clients' employees and their families. By providing comprehensive protection against the full spectrum of threats, we provide an unparalled level of security.
Our Risknet® service provides concise, up-to-the-minute analyses of risks in 100 countries. Risknet® is updated throughout the business day and can be accessed electronically worldwide around the clock. It consists of the following:
Highly analytical reports give early warning of impending developments
Summaries put risks into perspective
Air Travel Guidance
Analyzes information on latest terrorist risks concerning international travel
Helps travelers navigate foreign cities
Provides information on major terrorist organizations
Clients with urgent inquiries are assured instant, 24-hour telephone access to our area specialists
Our analysts also are available for customized surveys and recommendations on countries or regions under consideration for new or expanded investment. Risknet® is included in Chubb Corporation's Kidnap/Ransom and Extortion insurance policy. You may also subscribe for a yearly fee
Training Managers in High-Risk Areas
Individual or group training is given to executives, both expatriate and local, their families and staffs to improve their security practices, sensitize them to recognizing surveillances and prepare them to respond effectively to emergencies. Activity patterns of executives are analyzed in detail and recommendations are given for modifying them to mitigate risks.
Protective Driving Training:
Executives and/or their drivers are briefed on the conceptual basis for antiterrorist-driving methodology and instructed in techniques. We also conduct "hands-on" driving exercises both domestically and overseas.
Security-Awareness Training for Travelers:
It is neither possible nor necessary to provide protective details for the vast majority of executives who travel or reside overseas, so we place our major emphasis upon personal-security-awareness training. Our seminars survey terrorist/criminal methodologies and explain "gray" - anonymous - travel, airline - selection strategies, tactics for avoiding street crime, means of protecting sensitive information and other countermeasures.
Training Protective Personnel:
We support our executive-protection strategizing with tailored, state-of-the-art training for protective personnel. The stress is on meticulous advance work, efficient personnel deployment and fluid crisis response.
We pride ourselves on our ability to arrange and oversee visits to high-risk areas throughout the world, and to protect personnel, meetings and special events.
We are prepared to provide protective details, utilizing drivers and security escorts vetted and, in many cases, trained by our protection specialists. Transportation in soft (unarmored) or hard (armored) vehicles can be arranged as required.
If the client so chooses, visits may be "advanced" and supervised by protection specialists on our staff. The credentials of our language- and area-qualified specialists are impeccable, and they stand ready to coordinate security, communications, logistics and protocol requirements.
Our professionalism in responding to a wide range of corporate emergencies is broadly and enthusiastically acknowledged.
Development of Contingency Plans:
We are prepared to assist corporations in the formulation of crisis-management plans for kidnappings and other extortions, bomb-control guidelines and procedures for evacuating employees from unstable areas.
Our consultants travel at a moment's notice to evaluate threats levied by political or labor movements, or disgruntled or dismissed employees, calling upon psychiatric resources when necessary. They also arrange for the protection of the individual or asset at hazard.
Our 24-hour availability assures immediate response to a kidnapping, and we are prepared to advise and assist the victim corporation through every aspect of the recovery process. Working under corporate decision-makers, we propose strategies, interface with law-enforcement authorities, handle negotiations, and protect and even deliver ransom funds - always with the objective of assuring the survival of the hostage.
We also are called upon to deal with monetary demands levied in connection with threats to harm an employee, damage a critical corporate resource, including a database or website, or contaminate a consumable product. Again, our reaction is immediate, our experience substantial and our paramount concern the protection of the client corporation's personnel and assets.
We are ready to travel on short notice to assist in evacuating employees from areas that have turned hazardous. If necessary we are prepared to employ unconventional extraction methodologies.
Companies often find themselves unprepared to cope with those who would play hardball, especially in unfamiliar foreign climes. We help level the playing field.
Our extensive network of investigative resources, developed and refined in the course of 35 years, covers not only the United States but extends to the farthest reaches of the globe. And our excellent relations with law-enforcement agencies, both domestic and foreign, facilitate investigative steps and, if required, criminal prosecutions.
We approach all investigations in a prudent, deliberate manner. After analyzing clients' needs, we profer realistic strategies, ranging from the very basic to the exceptionally innovative. Often, a conservative approach is indicated, whereby we undertake an initial inquiry within a defined, reasonable budget. Its results and, when appropriate, suggested avenues of further exploration are presented to the client, who decides whether a fuller effort is warranted. Moreover, we add value to the information generated in the inquiry by collating it into a precise, perceptive, timely report.
- Employment candidates, potential acquisitions and prospective joint-venture partners and franchisees
- Review of criminal and civil history, credit history, financial data and history, education history, employment history, governmental and regulatory checks, social media, and reputation via interviews
- Investigations conducted online and in-person; world-wide reach
- Direct financial losses, such as embezzlement or health insurance fraud
- Indirect financial losses, such as kickback/bribery schemes, conflict-of-interest situations or bid-rigging/collusion
- Product diversion investigations and surveillance operations
- Breaches of the production-distribution chain through inventory erosion, diversion, hijacking
- Corporate penetration by criminal organizations
- Placing experienced operatives inside client facilities to develop intelligence on thefts
- Setting up reverse stings to expose criminally errant employees, vendors and distributors
- Market-watch programs
- Controlled "buys" to identify retailers, wholesalers, importers and, ultimately, manufacturers of bogus goods
COMPUTER FORENSICS AND CYBER INVESTIGATIONS
- Data recovery from workstations, laptops and servers
- Fraud and intellectual property theft; identity theft
- Investigation and prevention of intrusions
- Analyzing and documenting user access histories
Our comprehensive IT security audits have helped client corporations identify and remedy vulnerabilities in their computer networking systems and on their websites. Our experts have extensive experience in closing holes in computer networks, and limiting the opportunities for hackers to steal, corrupt or delete corporate information.
Having audited a wide range of computer systems, we have a great breadth of experience from which to assess the degree to which a computer network conforms to industry best standards and practices.
We also have on staff expert programmers, experienced in analyzing website vulnerabilities, and remedying them so that the websites are not hacked.
IT security audits include assessments and remedies for:
- Firewalls, routers, and perimeter defenses
- Networking topology and infrastructure
- Connectivity with data centers, and securing data transfer
- Public footprint
- Server vulnerabilities
- Workstation vulnerabilities
- Domain policies
- User and group rights, access permissions
- Remote access
- Wireless connection
- Linked mobile devices
- Data backup
- Secure handling of data and data destruction
- Information security handling
When negative publicity is posted on the Internet about a person or corporation, we provide assistance in manipulating this information so that it is hidden or more difficult to locate. We also assist in tracing and identifying the individuals who have posted the information.