Sort Alphabetically

Threat Assessment is now one of the most major focuses in every facet, from our day-to-day activities to businesses, from government operations to business facilities and those who work within them “including” their families.

Threats, as we know them, exist IN every facet of today’s world and that is a fact; however the reality of threats exist long-before media, internet and live broadcasting was able to bring it into your living room to view – into your world without your choice.

The true definition of a “Threat” is:

“Any activity or action by a person, group or country that would place “at risk” the interference, damage or destruction of life or property of another person, group or country.”

The “degree” of a Threat can be measured and assessed by careful analysis and research, but the harder part is to “proactively” plan to use “best, reasonable effort” to prevent such a Threat from occurring; however it is “more” important to plan how to “mitigate” the damage “WHEN” the Threat DOES take place.

Most individuals, companies and governments “REACTIVELY” deal with Threats. Yes, there may be basic protocols put into place, but in the “majority” of cases, the planning is ill-designed, does not take enough factors into account, and does not address the full-scope of what may have to be dealt with.

Many of us have heard the term “cause and effect”. This is an elemental component of Threat Assessment since you are constantly looking at the “potential cause of a Threat which can be rated into numerous sub-categories.

From there, the effects can be rated into a massive number of categories, each requiring a different form of first response and all the way to a specific method of mitigating the nature of the effect(s). The list is staggering in size and scope, but more important, it is constantly changing.

Threats are “fluid” in nature. There is no predictable constant with a Threat in almost all cases. This means it constantly has to be re-assessed, analyzed and the strategies and methodology must adapt to those changes. It is a full-time job, and a hard one.

RSI is known as one of the global leaders in Threat Assessment since 1970, when the term “Threat Assessment” was literally unknown. Though wars, industry espionage, massive frauds, destabilization of countries and governments, this “fluid” environment bred Threats of the likes we would never comprehend. From attacks on embassies to 9/11. To the deaths of intelligence officers under circumstances that could not be believed, to the Nationalization of a County that placed hundreds, if not thousands of lives and assets at “exceptional risk”.

We are now in a world that is constant flux, constant change, and the nature of Threats has been increased a hundred-fold with Terrorism.

Terrorism has been around since the beginning of time, but the nature of Terrorism has grown into an entity that is no longer ignorant and reactive. It is intelligent. It has objectives. It has financing. It is increasing in sophistication of its objectives and the operations it utilizes to achieve them. It also has an understanding of technology which it embraces.

Threat Assessment can be compared to a “jewel” with multiple facets. Each facet represents an area of risk or a category. From manufacturing facilities, to military complexes and bases. From embassies to medical facilities. Whether they be domestically located, or in a foreign country, it makes NO difference. Threats are NOT limited to location, distance or target of opportunity.

With each facet, it takes vigilant research and analysis from a “PROACTIVE” perspective to address the risks, requirements of protection of each risk as best as possible, and instead of running “what if” scenarios, one must run “WHEN” the scenario takes place to address the key two questions:

  1. How to respond the Threat WHEN it happens
  2. How to mitigate its effect(s)

There is no way around Threats any longer. One cannot deal with them “reactively” without suffering catastrophic effects. From total chaos and destruction of physical assets, to the injuries and deaths of personnel AND their families. Threats do NOT play be any rules or have any type of “honor”. There are no “rules of engagement” when Threats decide to become realities.

RSI has been actively involved with Threat Assessment with companies and governments, both domestically and internationally. We have dealt with companies and governments who are highly concerned about a “faceless” foe that is not visible; that is targeting their operation and/or people; and can unleash havoc and destruction on a level which is unfathomable. What is both frustrating and a major concern is “what do you do about Threats”?

RSI addresses Threats “Proactively” and with serious research, analysis and validation of critical facts / intelligence needed to make a “strategy”, a “Proactive Strategy” to:

  1. use best efforts to identify the numerous Threats of the business, industry or government agency / facility(s) that are exposed;
  2. the degree (risk) of the Threat taking place;
  3. What steps can be taken to PROACTIVELY reduce a Threat from taking place;
  4. the degree of the impact that would take place WHEN the Threat does take place;
  5. How to “MITIGATE” the damage, effects and short-term / long-term implications that WILL take place; and
  6. Re-evaluate, analyze and amend the Threat Strategies and methodologies.

We could spend hours on describing each industry or government operation Threat that is out there, but the list is overwhelming and goes out-of-date within days as the events of the world constantly change. Again, Threats are “fluid in nature” and constantly change, adapt and evolve based upon the opportunities that become available to them.

We, RSI, are leaders in the Threat Assessment disciplines with over 35 years of experience in addressing the ever-growing risks to life and property.

© 2015 RSI (all rights reserved)

Fraud with Labor-Related Services (or “How to get Broad-Sided by a Surprise”)

Fraud with Labor-Related Services (or “How to get Broad-Sided by a Surprise”) ©2016 Research Solutions, Inc. (all rights reserved) Over the years, there is not a single home owner who has not had the need to have improvements done to their property. The same applies to owners of commercial buildings More >

“What Threat Assessment Is (2 of 3 parts)”

“What Threat Assessment Is (2 of 3 parts)” © 2015 Research Solutions, Inc. (all rights reserved) To quickly recap part “1”, which is what would be considered the most simplistic “down and dirty” definition of what Threat Assessment is: A Threat is where there is a potential event or action More >

“What Threat Assessment Is (1 of 3 parts)”

“What Threat Assessment Is (1 of 3 parts)”  © 2015 Research Solutions, Inc. (all rights reserved)   Threat Assessment is not a “new” term, nor has it been around for a short time. The term itself has gone through many variations and buzz words, but the fact that the main More >

The Cloud (e.g. Cloud Computing) – As Solid as Real Clouds? (another Band-Aid on a Sucking Chest Wound)

The Cloud (e.g. Cloud Computing) – As Solid as Real Clouds? (another Band-Aid on a Sucking Chest Wound) © 2014 Research Solutions, Inc. (all rights reserved) We do like to address subjects, regardless if it is a sore, strongly debated or touchy subject. As a matter of fact, after 35 More >

“Threat, Fraud and Risk Management – What does it Really Mean? – Continuing Series – Part 2 – FRAUD”

“Threat, Fraud and Risk Management – What does it Really Mean?” “Continuing Series – Part 2” “Frauds” Published – ©2014 Research Solutions, Inc./Dr. Mark D. Lurie (all rights reserved)Published – ©1978-2014 Dr. Mark D. Lurie (all rights reserved)   The use of the word “Fraud” is easily tossed about, and More >