Voice Stress Analysis (VSA), is a USA-derived technology/software, for Detection of Deception and Truth Verification.
Technical & Electronic Surveillance Counter Measure (TESCM) = removal of all illegal listening devices, inspection and clearing of all communication lines (offices, cars, boats, homes, phones etc). via the top African company, in a JV-relationship).
Computer & IT-Network/Cyber security & IT-Intelligence services (via specialized JV-partners)
This dimension, including mobile and static surveillance & all counter intelligence services. Setting up intelligence collection systems, analysis and utilisation of collected intelligence. Also Counter intelligence policies and strategies development, for various industries & clients.
Individual / company profiling (employment, finances, assets & associations)
Utilising various platforms (& uncommon Intelligence/Network structures), both local and abroad, to identify & find such person(s), within framework of specialised investigations.
Full spectrum of investigations (forensic (fraud/embezzlement/corruption), homicide, theft, as well as commercial & insurance specific cases. This also include Undercover Investigations.
Business / Competitive intelligence (know your competitor, industry & adversary)
Advise on asset protection and guarding activities
Advise on Executive Protection strategies and selection of VIP teams
Security Risk Audits / Risk Assessments
Bomb detection & disposal (specialist knowledge and experience)
Our totally new and innovative approach towards detection, investigative and preventative angles, is applied throughout our operations, where a completely integrated and holistic intelligence analysis is continually conducted, encapsulating the following dimensions:-
We use gathered selective sensitive information to pro-actively protect and secure governments and corporate operations/clients, against illegal or harmful actions. Corporate Intelligence is a means to identify the threat before the crime manifest.
We organize, implement, co-ordinate and advice government officials and corporate executive on the latest counter intelligence techniques, with the use of our sophisticated high technology equipment and strategies.
We use this technique to ensure maximum protection of government and company interests in terms of the applicable laws and other statutes pertaining to the company’s operations within that specific country, this is done in accordance with the company’s objectives and policies.
TESCM (Technical Electronic Surveillance Counter Measures) is the utilization of both advanced and modern, electronic counter-measures equipment and form the bases of the above operational procedure. This identifies, quantifies and neutralizes the execution of electronic eavesdropping threats.
The above is viewed by CRS as an area of specialization, specific client requirements are discussed in confidentiality, at a neutral venue, removed from the possible place of intrusion, in view of the utmost sensitivity, surrounding acts of this nature.
The entity we are JV-partnered with, is an industry leader on the African continent, in terms of equipment (global/international standards, from USA/Europe) and the team skilled and experienced on world starndards, being the agents for said equipment and rendering training to Corporate entities and African Government structures.
Internal installations & other technical intelligence operations conducted to protect the security of the organization, employees & assets, from internal danger. Internal media, marketing - controlled publications and related strategies.
Outside installations & other technical intelligence/operations, conducted outside the organisation, to protect the unit members or the organisation, from external threats.
Technical Counter Measures (debugging and other methods) at various points, to protect company integrity.
Research and DevelopmentSurveillance operations, detection deployment and implementation of intelligence (& counter intelligence) principles.
Disinformation and guided press release, with related advanced strategies.
COMPETITIVE INTELLIGENCE (CI)
Total Holistic Risk Management methodology, assisting in the successful management of an entity in the face of local and/or global competitiveness.
CI is our systematic program for gathering and analysing of information about your competitors’ activities and general business trends, to further your own company’s goals.
Competitive Intelligence services
CI Counter Measures
We protect Intellectual property, Trade secrets and Sensitive Information, via Threat assessment, Vulnerability assessments and Active Competitive Intelligence Counter Measures.
COMPUTER / INFORMATION TECHNOLOGY INTELLIGENCE AND CYBER-CRIMES INVESTIGATIONS
ASSET PROTECTION ADVISORY
Our research and experienced has given birth to different and holistically approach to this dimension. We introduced and own the unique shift system that will go far in making security guarding a reality in this continent. We are not a security company but our expertise and personal experience in Security Management make us a sought after consultancy.
We advise and implement a number of high value/cash in-transit/sensitive documents strategies for governments and private companies.

THREAT ASSESSMENTS (new dimension)
WHAT DO YOU MEAN WHEN YOU SAY WORKPLACE THREATS AND – VIOLENCE?
Wherever there are people, there will be conflict. Conflict is a natural part of human interaction, in some instances the outcome of the conflict can be an improved relationship, in extreme situations it can lead to lethal violence. While most conflict will be resolved by the parties involved, or defuse naturally over time, some conflict can lead to long-term psychological and physical harm, think of domestic violence as an example. The workplace is no exception to this rule when it comes to human interaction. People spend the majority of their waking day in the workplace. Sometimes, the nature of a person’s employment increases the risk that threats can be made, however, in most examples, it is not a risky employment type that exposes a person to workplace violence, it is the mere nature of human relationships.

The Occupational Health and Safety Act (No.85 of 1993) states that an employer has certain duties towards their employees. These include providing and maintaining a working environment that is safe and without risk to the health of employees. The spirit of this Act can be interpreted to include the psychological and physical safety of employees in respect of violence and threats of violence. Employers can face civil actions from employees who are injured in the workplace, especially when there was some prior indication that violence could be a possible outcome.
While many threats, thankfully, don’t lead to lethal violence, this does not mean that there are no physical, psychological or work-place consequences. Employees who feel safe in their work environment will be more productive. By acting proactively when employees are feeling threatened, before any violence takes place, employees experience a positive attitude towards their employer, whom they perceive as caring about their wellbeing. Anxious staff are not productive and are more likely to book off sick with anxiety related problems, or to seek alternative employment. Helping identify warning signs for potential violence allows for actions to be put in motion to avoid such violence taking place, and allow staff to feel safe and secure.
RISK & SECURITY ASSESSMENTS

Security risk assessment is an on-going process of discovering, correcting and preventing security problems. The risk assessment is an integral part of a risk management process designed to provide appropriate levels of security for physical – & human principalities.
Security risk assessments are part of sound security practices and are required by most Risk & Information Security Policies.
Risk assessments and related documentation are also an integral part of compliance with the above Risk & Information Security Policy & Procedures.
The risk assessment will help an entity, to determine the acceptable level of risk and the resulting security requirements for each system.
The entity must then devise, implement and monitor a set of security measures to address the level of identified risk.
Risk Assessment also establishes the basis and rationale for mitigation measures to be planned, designed and implemented in the facility so as to protect the lives of people and to reduce damage to properties against potential threats.