• Have you got a security challenge you can’t solve? Call us:
  • +43 720 880 888  
  • E-Mail:   office@detego.org
Botschaften

Note: In order to close full circle of security for an Embassy or International organizations, the security system must also include an appropriate response of local law enforcement and emergency responders or other security forces to neutralize the threat, or an appropriate response by the management to evacuate the premises.

 

Foreign Embassies and Permanent international organizations seats are diplomatic missions. Therefore, they are afforded with special privileges and status, making them attractive as a target for any kind of security breaches.

Due to sensitivity of the issue, Detego investigation has developed processes and principles based on the Security Risk Management tool which covers broad aspects of safety and security procedures for foreign embassies and international organizations. With this comprehensive planning the structures such as buildings, warehouses, stores, shops, dwellings, containers, prefabs and tents are also covered and secured.

There are four important principles required for full coverage:

Application of the SRM process for a specific Embassy will identify the actors with the intent and capability to carry out credible threats against the protected area, with special attention on the threat actors with capability to exploit potential weaknesses of the security system.

The weaknesses have been documented in a security survey for the protected areas and analyzed within the vulnerability assessment of the SRM process for the specific protected areas. In this approach, not all Embassies will be protected the same way or to the same extent, but all the protected areas of protection will be commensurate with the specific security situation the premises faces. In regard to this, we work in close collaboration with local law enforcement and emergency responders in order to close the full circle of security services.

Proper security and safety of Embassy premises require an approach that focuses on the entire system and resulting management of it, rather than on the individual components of the system. The holistic systems approach is an integration of physical, procedural, technical and human aspects that create a self-reinforcing protection of the premises.

Our Security systems for Embassy premises are based on an effective use of the following principles:

  • Deter - physical and procedural security that attempts to prevent undesirable action against the premises by influencing attacker’s decision-making (increase perception of effort or fear of failure);
  • Detect - measures to detect and assess planning of threat actors, or their actual attempts to plan and execute the penetration of the security perimeter or to test the effectiveness of the security system in place;
  • Delay - physical, technical, procedural or psychological barriers to restrict movement and to allow time for appropriate response of local law enforcement and emergency responders;
  • Deny - the ability to oppose or negate the effects of an action against the premises, including denying access to information on the layout and contents of the premises;

The integration of the principles outlined in the Four 'D's above requires the concept of Concentric Layers of Security (Defense in Depth). Proper security premises framework requires a system designed with enough diversity and redundancy so that the strength of one particular component offsets the weakness of another. Components of the security system must be designed in an adequate number of layers to make it more difficult to defeat the whole system. All Embassy premises require at least two physical layers of security between personnel and valuable assets. The areas beyond direct Embassy control, including a system to only allow authorized persons, vehicles and other items to cross these layers (access control) are part of this. Physical security entails the full range of construction, fixtures, equipment and related procedures that are integrated into the larger security system.

Please contact us for more details.

Contact