- Counter Surveillance
Methods and devices used for detecting or thwarting surveillance.Technology has evolved to the point that anyone can 'weaponize' photos, videos, and speech right in the palm of their hand. A quick upload to their favorite social media site, and you have a possible scandal brewing.
Our counter surveillance teams deploy into the crowds, watching for minute body language that rises above the baseline for the area; extreme interest, agressive behavior to security barriers, nervousness, props ready to deploy, camera stagged. Each of these alone do not mean the individual means our client harm. However, together they could mean that an issue is about to occur. Our job is to identify the situation before they act and remove our client from the equation - or make sure there is no chance for harm.
Ideally assistance would begin with Situational Awareness and Evasive Drivers training for the client- built around the initial Threat/ Risk Assessment. There's multiple layers of considerations to this situation, but we're glad to talk through foundational issues before you decide to engage.
We don't want our teammates in photos either! There is a fledging 'security influencers' genre on social media. Our mission is protect your life, not invade it.
We model a good deal of our operation philosophy on Sun Tzu's, "The Art of War"- being subtle to the point of formlessness is our default position. If you have a need or desire for large framed folks with bulging muscles, etc., we can find a few, but that's not primarily how we like to operate.
Generally, yes! But we can't run one operator on duty (active or standby) for 23.5 hours a day and hope for a good outcome. That becomes a danger to the client and a risk to our teammate and brand as well.
A good counter surveillance team is yet another layer of the protective 'bubble' placed around our clients. The close protection detail being the inner-most layer, with the counter surveillance team enveloping them. The outer-most layer can include the advance team, transport advisors, and technical support - some of which may not even be on-site, but still play an instrumental role in securing our clients.
- Our Strategy
The first meeting
Understanding Your Situation
Every situation is unique and so will be your security response. During our first interaction, we will discuss your environment, business, and lifestyle risks that can affect your need/want for ///MercurySword Security services.
The second meeting
Security Plan Consultation/Review
A custom security plan is crafted to allow you the utmost personal freedom. Coverage typically includes residence, travel, transportation, and events protocols. Watchdog services include social media and the open source Internet.
The final meeting
Implementing the Plan
Whether as a short-term, 'need based' security team or long-term protection detail, your custom MecurySword Security plan will include the most highly trained agents to assure the safety of you, your enterprise, and your family.
- Contact Us
Do you have questions about any of our services as they apply to your specific need or situation? Schedule a call (voice or video) or an in-person meeting to discuss how we can assist.
Call Us
Phone +1 786-475-1523Our Location
MercurySword Security
123 Miami Blvd, Suite 100
Miami, FL 33215