Sort Alphabetically

Threat Assessment is now one of the most major focuses in every facet, from our day-to-day activities to businesses, from government operations to business facilities and those who work within them “including” their families.

Threats, as we know them, exist IN every facet of today’s world and that is a fact; however the reality of threats exist long-before media, internet and live broadcasting was able to bring it into your living room to view – into your world without your choice.

The true definition of a “Threat” is:

“Any activity or action by a person, group or country that would place “at risk” the interference, damage or destruction of life or property of another person, group or country.”

The “degree” of a Threat can be measured and assessed by careful analysis and research, but the harder part is to “proactively” plan to use “best, reasonable effort” to prevent such a Threat from occurring; however it is “more” important to plan how to “mitigate” the damage “WHEN” the Threat DOES take place.

Most individuals, companies and governments “REACTIVELY” deal with Threats. Yes, there may be basic protocols put into place, but in the “majority” of cases, the planning is ill-designed, does not take enough factors into account, and does not address the full-scope of what may have to be dealt with.

Many of us have heard the term “cause and effect”. This is an elemental component of Threat Assessment since you are constantly looking at the “potential cause of a Threat which can be rated into numerous sub-categories.

From there, the effects can be rated into a massive number of categories, each requiring a different form of first response and all the way to a specific method of mitigating the nature of the effect(s). The list is staggering in size and scope, but more important, it is constantly changing.

Threats are “fluid” in nature. There is no predictable constant with a Threat in almost all cases. This means it constantly has to be re-assessed, analyzed and the strategies and methodology must adapt to those changes. It is a full-time job, and a hard one.

RSI is known as one of the global leaders in Threat Assessment since 1970, when the term “Threat Assessment” was literally unknown. Though wars, industry espionage, massive frauds, destabilization of countries and governments, this “fluid” environment bred Threats of the likes we would never comprehend. From attacks on embassies to 9/11. To the deaths of intelligence officers under circumstances that could not be believed, to the Nationalization of a County that placed hundreds, if not thousands of lives and assets at “exceptional risk”.

We are now in a world that is constant flux, constant change, and the nature of Threats has been increased a hundred-fold with Terrorism.

Terrorism has been around since the beginning of time, but the nature of Terrorism has grown into an entity that is no longer ignorant and reactive. It is intelligent. It has objectives. It has financing. It is increasing in sophistication of its objectives and the operations it utilizes to achieve them. It also has an understanding of technology which it embraces.

Threat Assessment can be compared to a “jewel” with multiple facets. Each facet represents an area of risk or a category. From manufacturing facilities, to military complexes and bases. From embassies to medical facilities. Whether they be domestically located, or in a foreign country, it makes NO difference. Threats are NOT limited to location, distance or target of opportunity.

With each facet, it takes vigilant research and analysis from a “PROACTIVE” perspective to address the risks, requirements of protection of each risk as best as possible, and instead of running “what if” scenarios, one must run “WHEN” the scenario takes place to address the key two questions:

  1. How to respond the Threat WHEN it happens
  2. How to mitigate its effect(s)

There is no way around Threats any longer. One cannot deal with them “reactively” without suffering catastrophic effects. From total chaos and destruction of physical assets, to the injuries and deaths of personnel AND their families. Threats do NOT play be any rules or have any type of “honor”. There are no “rules of engagement” when Threats decide to become realities.

RSI has been actively involved with Threat Assessment with companies and governments, both domestically and internationally. We have dealt with companies and governments who are highly concerned about a “faceless” foe that is not visible; that is targeting their operation and/or people; and can unleash havoc and destruction on a level which is unfathomable. What is both frustrating and a major concern is “what do you do about Threats”?

RSI addresses Threats “Proactively” and with serious research, analysis and validation of critical facts / intelligence needed to make a “strategy”, a “Proactive Strategy” to:

  1. use best efforts to identify the numerous Threats of the business, industry or government agency / facility(s) that are exposed;
  2. the degree (risk) of the Threat taking place;
  3. What steps can be taken to PROACTIVELY reduce a Threat from taking place;
  4. the degree of the impact that would take place WHEN the Threat does take place;
  5. How to “MITIGATE” the damage, effects and short-term / long-term implications that WILL take place; and
  6. Re-evaluate, analyze and amend the Threat Strategies and methodologies.

We could spend hours on describing each industry or government operation Threat that is out there, but the list is overwhelming and goes out-of-date within days as the events of the world constantly change. Again, Threats are “fluid in nature” and constantly change, adapt and evolve based upon the opportunities that become available to them.

We, RSI, are leaders in the Threat Assessment disciplines with over 35 years of experience in addressing the ever-growing risks to life and property.

© 2015 RSI (all rights reserved)

“Business Rescues Part-2”

“Business Rescues Part-2”   Published ©2014 RSI/Dr. Mark D. Lurie Published ©2010-2014 RSI/Dr. Mark D. Lurie   The term “Business Rescues” is not well-received, and more palatable terminology has been adapted such as: Business Reconstruction (e.g. “Business Turn-around(s)”) Distressed Business Operations Business Reorganizations However, in each of the three terms More >

“Monitoring the On-going Stability of Foreign Countries and Their Policies toward the United States – Part 1, an Overview”

“Monitoring the On-going Stability of Foreign Countries and Their Policies toward the United States – Part 1, an Overview” Published ©2014 RSI/Dr. Mark D. Lurie (all rights reserved) Examination of threats to the United States has always been treated as analysis and policy formation based the “primary” prospective (potential or More >

“People Networking Fraud – Part-2”

“People Networking Fraud – Part-2” Published ©2014 RSI/Dr. Mark D. Lurie (all rights reserved) Published ©2010-2014 RSI/Dr. Mark D. Lurie (all rights reserved)   Facebook®, LinkedIn® and Maven® are just three of literally thousands of contact management sites, business introduction sites and professional referral sites. In essence, all of them More >

“Research – What it really takes to Hunt for Valid Information”

In a formal court video closed-door hearing, an Assistant Prosecutor (AP) is performing a direct examination and challenge of a Forensic Expert Witness (EW), whose expertise is in evidence reconstruction. The issue is regarding a potential conflict of interest as well as information supplied to the court by the EW. More >

“What Threat Assessment Is (2 of 3 parts)”

“What Threat Assessment Is (2 of 3 parts)” © 2015 Research Solutions, Inc. (all rights reserved) To quickly recap part “1”, which is what would be considered the most simplistic “down and dirty” definition of what Threat Assessment is: A Threat is where there is a potential event or action More >