© 2018 by Condor Security Enterprises. 

 | office@condor-security.com | Tel: +972-50-5390686 | Fax: +972-9-9548665

Special Forces

Condor works closely with Special Forces that respond to transportation security related hostile activities.

In order not to rely on these Special Forces that can only intervene after an event has initiated, Condor adheres to developing and creating specialized teams that can respond in real time. In order to maximize the operational capabilities of security personnel working in this industry we develop customized training solutions for having a local efficient apparatus that cam prevent or rapidly neutralize the attack.

 

This process does not undermine the Special Forces! Rather , installations should begin having their own security apparatus and special forces.

Some of our services include but are not limited to:

  • Onboard security personnel

  • Staff training

  • Drivers

  • Pilots

  • Flight attendants

  • Selection of personnel

  • Weapons selection

In addition we specialize in providing security solutions to:

  • Ground

  • Air

  • Naval

  • Multitask

 

Emergency and crisis scenarios


In addition we offer special services including:

  • Architectural security foundation – adjustment of security apparatus to the specifications of the transportation facilities and vehicles, identification of possible problematic elements and

  • Cargo – Cargo security system vs. installation security system

  • Personnel and logistics
    o Employees and outsourcing companies – training and screening of personnel
    o Pre and post-hiring security screenings

     

Intelligence

  • Profiling – methods for the identification of problematic passengers and possible threats

  • Surveillance and counter-surveillance (including with motorcycles) – the deployment of surveillance capabilities around the perimeter of the transportation facilities and vehicles, as well as detection capabilities for possible unwanted elements conducting surveillance in preparation of attack or sabotage

  • Clandestine security – deployment of clandestine personnel and measures to provide concealed detection capabilities

  • Protocols and checklists
     

* Technology – security assessment of existing technological means within the security system, including it integration with the human factor and examination of it effectiveness in order to deal with threats.

*K9 – the use of dogs as part of the security system, including evaluation of existing procedures and assistance in constructing operational action

*Security screenings – of passengers and baggage

*Facility security screening

  • Sterilization of areas

  • Inspections of passengers (including body language, innocent interrogation
     

*Terror – crisis management and communication

  • Operational Control Center and Emergency Operation Centers

  • Emergency responders/response teams

  • Operations and procedures

  • Command, Control and Coordination

  • Recovery from crisis and continuation of operations

  • Coordination with auxiliary forces

  • Chain of command

  • Operational procedures for suspicious objects/persons/bomb threats

  • Reporting and communication procedures

  • Operational evacuation procedures

  • CBRN (Chemical, Biological, Radiological, and Nuclear)
     

*Counter suicide terror – IED (Improvised Explosive Device), VBIED (Vehicle Born Improvised Explosive Device) Tools/ methods/facilities/transportation networks
 

*Special Operations (Law enforcement and SWAT) Including arrival of security forces on the scene, means of arrival and deployment, deployment in problematic locations

  • Creation of combat units
     

*Training, drills and simulations

  • Mass-casualty preparedness

  • Instruction competency

  • System operational readiness tests
     

*Audits & CVA