SEVICES / TRAINING
SECURITY SERVICES AND TRAINING
FOR THE PRIVATE SECTOR AND
SERVICE - INTEGRITY - RELIABILITY
PHYSICAL SECURITY VULNERABILITY ASSESSMENT:
Assessment involving a physical tour of a facility (structures, property, etc) with the objective of identifying threats and gaps in the protection of people, critical operations, data, and other assets. A detailed report providing “Options for Consideration” is provided to implement at the discretion of your organization’s leadership. Report includes analytical portion (produced by CIA-trained Analysts) addressing local/regional threats pertaining to criminal, terrorism, and natural disasters. No-cost or low-cost options are provided.
WORKPLACE VIOLENCE / ACTIVE SHOOTER (WV/AS):
Provides actions to prevent, mitigate, and/or react to a Workplace Violence / Active Shooter situation. Information regarding Pre-Incident Indicators (PIIs), and Stop-The-Bleed may also provided (ie- treating the injured prior to arrival of first responders).
BEHAVIORAL / THREAT ASSESSMENT:
Behavioral Assessment (conducted by FBI BAU-trained personnel) of an individual, internal or external, who may pose a threat to the organization or its interests. In addition to the Behavioral Assessment, use of Open-Source Intelligence (OSINT), and/or various data bases, and/or Law Enforcement liaison may be employed. If desired, packaging and passage of the assessment to the appropriate law enforcement entities for action.
CYBER THREAT MONITORING:
Conduct ongoing monitoring (or a one-time snapshot) of the organization’s exposure on the internet via Open-Source Intelligence (OSINT), Social-Media, Dark-Web, and Deep-Web (accessible with a specialized browser) to scan and identify risk/threats directed towards the organization or a person. If threats are detected, evaluation and assessment through intelligence-based risk assessment will be reported to leadership, and if desired, reported to the proper authorities.
CCTV, LIGHTING, BULLETPROOFING, SAFE ROOMS:
High quality camera and lighting placement/installation, as well as options for monitoring. Bulletproofing of walls, doors, and windows. Create a customized Safe or Panic Room in your home, business, or school.
BACKGROUND / PRIVATE INVESTIGATION:
“Basic Background” includes identification, DOB, current & past addresses, traffic and criminal history. “Full Background” includes everything listed in “Basic Background” plus financial indicators, all social media, evictions, and photos. May also involve surveillance, interviews,
and missing persons.
Often referred to as “Bug Sweeping,” a highly skilled FBI-trained operator employs unique and highly technical equipment to detect surveillance devices in a home or office. Conducted by retired FBI Special Agents / Certified Technically Trained Agents (TTAs).
EXPLOSIVE DETECTION - K9:
Protection of people, property, and reputation through use of highly-trained Explosive Detection Canine (EDC) and Handler. Areas of expertise: galas, festivals, film premiers/shoots, churches, schools, conferences, Executive Protection support, sporting events.
RISK MANAGEMENT FOR SPECIAL EVENTS:
Consultation addressing “Advance” procedures and protocol, involving need for security personnel, medical personnel, Protection Detail, cameras, lighting, and general safety plan. Liaison with law enforcement, fire, local hospitals, et cetera.
Conducted by an FBI Certified Polygraph Examiner, retired FBI Special Agent. Often utilized regarding incoming or onboard personnel to potentially gain information, detect deception, or elicit a confession.
SITUATIONAL & VULNERABILITY AWARENESS (SVA):
Promotes a culture or mindset of security that one aspires to maintain throughout daily activities. The objective is to raise awareness of potential threats in any environment (home, office, etc), with respect to any set of circumstances.
DE-ESCALATION & CONFLICT RESOLUTION (DCR):
Provides techniques designed by the FBI's Crisis Negotiation Unit to help prevent or
de-escalate a situation, including warning signs, body language, and common barriers.
CYBER SECURITY / INTERNET SAFETY (CS/IS):
Keep yourself, your organization, and your colleagues safe from online hackers, malware, ransomware, phishing scams, and various other cyber-crimes that result in massive economic loss every day around the world.
COMMON SCAMS & FRAUD (CSF):
Learn about the most common scams and fraud that are targeting everyone today to keep yourself or your business safe from potentially tremendous loss.
INDICATORS OF HUMAN TRAFFICKING (IHT):
Provides basic knowledge, awareness, and recognition of common signs of this extremely serious criminal enterprise occurring right in our own neighborhoods.
INTERNET SAFETY FOR PARENTS (ISP):
The objective of this training is to help keep our children and teens safe from online predators, raise awareness of concerns regarding social media/gaming/etc, address cyber bullying, and to provide tips and resources.
INTERNET SAFETY FOR CHILDREN (ISC):
Similar to ISP (see above), but a sanitized version for youngsters to easily understand, and keep themselves safe.
CRITICAL INCIDENT MITIGATION (CIM):
Empower your personnel to prepare, prevent, or mitigate a Critical Incident with a session that incorporates and combines recognition of Pre-Incident Indicators (PIIs), “Red Cell” Critical thinking, and Behavioral Analysis.
ELDER FRAUD: SCAMS & SAFETY (EFFSS):
Many of today's business professionals have aging parents/seniors at home who are the targets of various scams and are in jeopardy of losing their life savings to criminals. This training can be directed to seniors or their loved ones to help them become aware of these threats that may be initiated via internet, telephone, by mail, or in person.
Guard against a potential threat from a current or former employee, contractor, or business partner who has access to your organization's network systems, data, or premises, and may cause harm wittingly or unintentionally.
SAFE MAIL HANDLING:
Involves a customized course of instruction for any designated personnel with respect to potential threats arising from incoming mail. This training provides methods regarding how to recognize various potentially threatening or dangerous mail/packages, and safely responding by employing certified safe and secure mail handling procedures, as well as best practices and policies.
SAFE FIREARMS HANDLING /
WEAPONS SAFETY & TACTICS:
Learn how to safely and efficiently handle, store, and use your weapon. Training is conducted by recognized leaders in the field, former law enforcement and/or military personnel. Simple handling or advanced Close Quarter Battle (CQB) training is available.
SERVICE - INTEGRITY - RELIABILITY
WHO ARE WE?
Civilian Defense Program/LOOP Inc. is a one-stop Security Consulting Firm that features a network of PROFESSIONALS with an extremely wide variety of experiences and backgrounds from decades of service with the FBI, CIA, US Secret Service, and other government entities, as well as the Private Sector. Our vision was to take the operational skillsets we had learned and honed with decades of real-world experience, and bring that knowledge (and top-tier training) to the Private Sector to better prepare all entities for the myriad of threats within modern society. One of our primary goals is to empower and provide increased confidence and peace-of-mind to those within the Private Sector across the United States. In pursuance of this objective, our specialized training ensures Private Sector entities have fulfilled their core responsibilities of providing for the safety, health, and welfare of their employees, clients, et al. We are passionate and dedicated to what we see as our mission:
Seeking safety and security in the communities that we work and live in, and to make use of the experience we gained in service to our country. We do this by translating the unique knowledge and skills we gained during our previous careers into a benefit for our clients.