SMI - Consulting
Re-Evaluating Government Employee Performance Standards Surveys have shown that the overwhelming majority of Americans believe that the Federal Government – across all USG agencies – is inherently broken. As someone who has lived in the Washington DC area for almost twenty years, as well as had plenty of experience working within the federal contracting system, I also fall into this category of concerned/disenfranchised citizen. However, unlike most tax payers with grievances, my issue is not with mismanaged spending, inept bureaucracy, or bloated budgets. My beef runs deeper. I am disgruntled with the poor measurement system used to evaluate government employee performance. Unlike the private sector, people in the federal government are measured on input (meaning what they do in their day-to-day job tasks) rather than output (how they contribute to the overall goals of that organization). In private industry, success is measured in terms of profit and loss, market share captured against the competition, and customer satisfaction. In government, the benchmarks for success are not as clearly defined. In the private sector, if you can’t deliver on your job responsibilities, you are terminated in favor of someone who can. Unfortunately, once someone gets a job within the government, it is tough to get rid of them. In fact, often times the only way a manager can get rid of an underperforming government employee is to promote him/her out of their position and into another office (usually to the eternal dumping ground known as HR). Fear of workplace discrimination is one of the main culprits for this practice. This is why the majority of government employees still receive an above average score on their annual performance evaluations, despite many not contributing anything more than coming in thirty minutes early each morning with donuts, or being the person who brews the best pot of coffee. If this is the gold standard of success, it is no wonder that government employees can make a career of arriving each day at 8:01 and departing at 4:59, while their actual job responsibilities only require about 2-3 hours of total work each day. Good ol’ Bob over there in his corner cubicle may be a heck of a guy, with a great sense of humor (plus, he proudly wears his Washington Redskins jersey every Friday), but as far as the tax payers are concerned, he’s a non-contributor in terms of ROI. And forget about creative-thinking. Why should Bob risk developing a new idea when there is a chance that it could be ultimately rejected? Such rejection could reflect poorly on his annual performance review. That’s why the old saying holds true - nobody in government ever got fired for saying “No.” So at this point, many of you may be saying that I’m being unfair to the millions of government workers who do make a positive impact every day and are underpaid to serve their country. I will be the first to acknowledge that there are indeed many hardworking Americans who contribute to our great nation, and I would never disrespect their contribution. I would also argue that around 20% of these individuals serving our country are so talented that that they would be a tremendous success in whatever private sector field they entered (government staffing is a perfect example the Prado Principle in action). The point I’m trying to make is simply this… the public sector does not discourage or weed-out poor performers, thus giving those who do perform “above-and-beyond” a bad rap. Jack Welch used to fire the bottom 10% of low-performing employees at GE each year. Imagine doing such a radical practice in government. You would have 10% of all employees suing each year for workplace discrimination (and probably another 10% suing because they felt too much stress in their jobs). If competition drives the free-market economy, it would be an interesting experiment to apply that principle to government service. There are millions of great Americans serving in public positions who make our country what it is today. Why not reward those heroes by realistically measuring their true contribution to society? By revamping the performance evaluation standards of the government to match that of the private sector, our nation would become even stronger.

2016 Holiday Message from Security Management International SMI

Happy Holidays from SMI

Happy Holidays from SMI
Happy Holidays from SMI
Happy Holidays from Luke Bencie, Managing Director of SMI
From all of us at SMI, we wish our global security partners in the U.S. and worldwide a safe and happy holiday season. We look forward to working with you around the globe in 2017 on security consulting projects to make the world a little bit safer.

The contemporary business tie has a long and unexpected history behind it tracing its way back through Victorian fashion and Fifteenth Century Parisian fancies it seems as if the necktie originated originated as a cravat worn by Croatian Warriors so modern business men wear your armor boldly. Preventing corporate espionage is as important as your professionalism!

Corporate Espionage: Modern Updates to an Ancient Tactic

"One good spy is worth ten thousand soldiers" - Sun Tzu The Art of War

Spying has been called the world's second oldest profession (you can guess the first...) Since the dawn of civilized man only time itself has proven to be more valuable commodity than information. In the cut-throat world of business Warfare this gathering of information because of a competitor comes in a variety of forms and take several names. On the "ethical" end of the spectrum, business professionals May refer to this collection of effort as:

  • Open source research
  • Market analysis
  • Due diligence
  • Competitive intelligence
  • These terms represent how a company legally acquires dirt on their rivals. However, what if a company wanted to know more about their competition than just a few clicks on Google can tell them? And in these particular instances, the information becomes exponentially more valuable - with sometimes millions, if not billions of dollars at stake. Think Pepsi going after Coke's secret recipe. Or Mrs. Fields hunting for the Keebler Elf Cottage. When we transition from dealing with balance sheets that contain a few zeros to ones with 7 or 8, the knowledge desired ceases to be called information and becomes known as intelligence worthy of corporate espionage.

    According to the US intelligence Community (IC), the folks who played James Bond for a living, intelligence is defined as:

    A body of evidence and the conclusions drawn therefrom that is acquired and furnished in response to the known or perceived requirements of consumers. It is often derived from information that is concealed or not intended to be available for use by the acquirer.

    Differentiating Between Information and Business Intelligence

    Remember, the major difference between information and intelligence is that intelligence is something you do not want your competition to know. It's that not yet patented schematic that you have stowed under your mattress or that business plan you made your partner swallow.

    Now, acquiring got intelligence need not be illegal or unethical, but it does require a degree of vigilance and perception above and beyond the gathering of basic information. However, to gain access to this intelligence, many individuals, companies and governments do in fact engage in the more dubious legal side of the scale, practicing what is known as: economic espionage or industrial espionage. Corporate espionage although slightly variable in definition, it can be equally damaging to the person or organization targeted for attack.

    Every level of your business can be suspectible to corporate espionage. By assessing and analyzing your business, creating policies that prevent disclosures, and train employees to be aware of risk you can minimize your exposure. Read more from our Art of Business White Paper.

    SMI offers additional training courses for executives and business travelers. Click to find out more about our Traveler Safety Courses including: Kidnapping Prevention and Awareness Course and Hostile Travel Course.

    In addition, SMI provides Security Consulting, Security Management, and Intellectual Property Protection for executives, business owners, and Fortune 500 companies.

    CARVER Washington DC Training Courses Announced for 2017 in Tysons Corner, Virginia

    April 11-13, 2017
    June 13-15, 2017
    August 15-17, 2017
    October 10-12, 2017

    Each course is limited to 8 attendees | Register Below Today!

    The CARVER Target Analysis and Vulnerability Assessment™ training course, offered by Security Management International, is an interactive three-day course on conducting facility threat and vulnerability assessments. CARVER Washington DC is a nationally recognized target analysis and vulnerability assessment methodology used extensively by the military, intelligence and law enforcement community and the Department of Homeland Security in its Automated Critical Asset Management System.

    The course is run by Leo Labaj, SMI Director of Critical Infrastructure Protection. With 40 years of government and commercial experience, Mr. Labaj is a veteran of the U.S. Navy, the Air National Guard and the Central Intelligence Agency. He has managed research and development programs and applied science projects for the Department of Defense, the Department of Energy, the Intelligence Community, and federal, state and local law enforcement agencies.

    CARVER Washington DC identifies assets most attractive to attack by an adversary based upon key factors:
    Criticality – Single points of failure and degree of importance to system operations.
    Accessibility – Ease of access to critical assets.
    Recoverability – The time and effort to recover system operations after an adverse event.
    Vulnerability – Level of exposure to attack based on adversary capability.
    Effect – Magnitude of adverse consequences resulting from malicious actions and subsequent responses.
    Recognizability– Likelihood that potential adversaries would recognize that an asset is critical.


    SMI Capability Statement Security Consulting

    Capability Statement Security Consulting

    Click to download PDF version of SMI Capability Statement.

    About SMI

    Security Management International (SMI) is a global security consulting and intelligence advisory services provider. Our principal services include research and analysis, training, emergency response planning, vulnerability assessments, competitive intelligence and technical services. These services are used by numerous US and international clients including varying levels of government, Fortune 500 companies, utilities, law firms and associations. Our professionals have extensive experience and diverse backgrounds from successful careers in intelligence, military, law enforcement, national defense, emergency response, information technology and academia. Many of our employees have lived and worked abroad and regularly apply their extensive scope of knowledge and experience to our varied projects. Cage Code: 6PYL3 DUNS Number: 078402784

    SMI Accomplishments

    • SMI Managing Director presented as Keynote Speaker at “SECURE Australia 2015” (topic: Corporate Espionage)
    • SMI Named Finalist for “Consultancy of the Year” at Security Excellence Awards 2013/2014
    • Recognized experts for instruction of “CARVER Target Analysis and Vulnerability Assessment Methodology”
    • Annual crisis management contracts with major Fortune 500 security departments

    SMI Differentiators

    • Established in 2010
    • Performed consulting projects in 24 countries
    • Recognized Small Business
    • Managing Director author of Among Enemies: Counter-Espionage for the Business Traveler
    • Full-time security operations in Brazil since 2011
    • Several associates cleared TS/SCI
    • Experts in Counter-Espionage

    The SMI Vision

    SMI will always be be positioned to anticipate and counter both internal and external threats before they can act and to minimize damage should a penetration occur. The staff of SMI will always be the most competent and field tested personnel available. Finally, SMI strives to be #1 Choice for Threat, Vulnerability and Emergency Response across the Intelligence Community.

    Services/Benefits Offered

    Primary NAICS & Class Codes

    • 611430 – Management/Training
    • 928110 – National Security
    • 541618 – Management Consulting
    • 541690 – Other Scientific/Technical Consulting
    • 928120 – International Affairs

    Current and Previous Clients

    What Customers Say

    “The value of a consultancy to me is the quality of their people and the fit to my application. SMI provided the right consultant with a background perfectly aligned to our needs. Their work will pay dividends far into our future.”
    - Marty Mulligan, Former President and CEO, Rohde & Schwarz Federal Systems Inc.

    “As part of the National Security Directorate, I was proud to have stood alongside of SMI and would highly recommend them for any future projects that require an expert knowledge of threat/vulnerability assessments and emergency response planning. Their personal commitment to this country’s security is evident and I consider myself fortunate to have worked with them. Security professionals do not come any better than these men!”
    - Dave Lannom, Jr. National Security Directorate, Oak Ridge National Laboratory

    Security Consulting

    SMI - Security Consulting
    Luke Bencie, Managing Director of SMI

    Luke Bencie is the Managing Director for Security Management International, LLC.

    In this capacity, Mr. Bencie has been a consultant to the US Department of State, US Department of Defense, Fortune 500 companies, as well as foreign governments. He specializes in conducting strategic and security management assessments, performing counterintelligence and due-diligence investigations, and also provides specialized intelligence advisory services. He is the author of "Among Enemies: Counter-Espionage for the Business Traveler" and "Global Security Consulting: How to Build a Thriving International Practice."

    Mr. Bencie has worked in over 100 countries and has trained thousands of domestic and international students from police, military, and intelligence services on topics such as economic and industrial espionage, border security, intellectual property protection, counterfeiting/piracy, and recognizing/discouraging terrorist travel movement. Prior to establishing SMI, Mr. Bencie was a Senior Security Consultant for Raytheon Company in the Intelligence and Information Systems Division, and assigned to the emerging markets of Brazil, India and Lebanon.

    Mr. Bencie previously served on the US Department of State’s Foreign Emergency Support Team. In this capacity, he was responsible for responding to terrorist attacks carried out against US targets overseas. As a result, he performed numerous trips to Iraq, Afghanistan, and other "hot spots" throughout the world.

    Mr. Bencie holds graduate degrees in “National Security Studies” from The George Washington University’s Elliott School of International Affairs and The American Military University, as well as an MBA from the University of Sarasota. He received his BA from Michigan State University and completed further course work from the University of Pennsylvania’s Wharton School, the Federal Bureau of Investigation’s National Training Academy, and the United Nations Institute for Training and Research.

    As the global business environment gets “flatter”, more and more organizations are moving operations overseas.  However, expanding a corporate footprint abroad can often times become a painful and very expensive undertaking – especially if the area of operation is in an underdeveloped area of the world.

    Allow Security Management International to take the guesswork out of your planning.  At SMI, our associates have spent their careers establishing large-scale operations, across six continents, in countries that could be classified as either emerging markets or third-world failed states.  Whether your business takes you Africa or Asia, SMI can provide the following security consulting services, to ensure that your operations are profitable and your employees secure:

    • Risk Management 
    • Geopolitical Surveys 
    • Logistical Planning 
    • Area Studies 
    • Performance Improvement 
    • Security Compliance Audits
    • Duty of Care Reviews
    • Crisis Management

    Security Management Consulting Process

    Our consulting process begins with indetifying the problem with a client. Together we then define the scope of work for the project. We then go through a thorough process to provide deliverables for the client. Click to download the PDF.

      Assessment & Analysis
    • Threat and Vulnerability Assessment 
    • Conduct Target Analysis 
    • Form and Validate Solution 
      Integration & Training
    • Implement Plans, Processes, and Procedures 
    • Provide Training on Recommendations 
    • Have Employees Demonstrate Proficiency
      Application and Testing
    • Evaluate and Measure Effectiveness
    • Test Policies
    • Update Plans, Policies, and Procedures

    Once we have worked through the work of scope with a client, we make sure that the problem was solved to client satisfaction and implement on-going maintenance and mitigation strategies.

    security consulting process

    Security Management

    security managment

    As our name SMI implies, we specialize in international security management.  Whether it is performing an assessment of your corporate security practices or helping you to establish security protocols in a foreign environment, the SMI team can provide your business with decades worth of security management experience.  Allow us to help you establish a security program that fits your organization’s budget and provide your employees, customers, and intellectual property with the highest levels of protection.

    Critical Infrastructure Protection

    SMI Critical Infrastructure

    Today’s critical infrastructure, private businesses and government facilities are vulnerable to various levels of physical damage resulting from criminal attack, terrorism, and natural disasters.

    Identifying and assessing these vulnerabilities provides organizations with the ability to mitigate these threats and allows them to best secure their property and protect personnel.

    At Security Management International, our Critical Infrastructure Protection (CIP) Division offers intelligent security solutions when performing threat and vulnerability assessments, as well as emergency response planning.

    Our client deliverables are not “boilerplate” reports, nor do we use rehashed security templates for every client, regardless of their industry. Instead, we fully recognize that each client’s threats and weaknesses are unique, thus requiring a customized approach to providing recommendations.

    Our seasoned security professionals have a solid history in the fields of target analysis, vulnerability assessments, explosive blast effects, intelligence operations, emergency management and response planning. They have conducted threat assessments for national and international government and commercial customers, to include:

    • Embassies and Consulates
    • Domestic and International Government Buildings
    • Domestic and International Airports
    • Domestic and International Seaports
    • Border crossing and ports of entry
    • Telecommunications systems
    • Refineries
    • Natural gas systems
    • Water and power utilities
    • Nuclear facilities
    • Military installations
    • Fortune 500 businesses

    In additional our associates are certified in a variety of vulnerability assessment methodologies, which are specifically utilized to meet and enhance the requirements of our clients. These certifications include:

    • CARVER – US Intelligence/Special Operations community methodology
    • RAM-C – Risk Assessment Methodology for Communities (Sandia National Laboratory)
    • Ram-W – Risk Assessment Methodology for Water (Sandia National Laboratory)
    • ASVACO – Software based security assessment methodologies
    • AIChE Chemical SVA – Chemical facilities and the support infrastructure
    • BZPP – Buffer Zone Protection Plan

    Security Management International’s Critical Infrastructure Protection Division has the capabilities and resources available to rapidly respond to your organizations requirements for comprehensive threat and vulnerability assessments and emergency response planning.

    Physical Penetration Testing

    SMI Physical Penetration Testing

    At Security Management International, our team of human intelligence (HUMINT) experts understand that the best defense is a good offense. For this reason, our physical security penetration tests (PENTESTS) start with an advanced and tailored understanding of the threats directly facing your organization. To maintain a good security posture, it is imperative to identify those threats and to know the vulnerabilities and response capabilities of each system and sub-system in question. Utilizing intelligence gathering techniques acquired from decades worth of global operations, our SMI HUMINT Team is able to provide our clients with a full picture of their vulnerabilities. Our tactics range from physical and technical surveillance, reconnaissance, casing/probing, elicitation, and social engineering.

    The types of physical security penetration testing commonly executed by our team include:

    • External surveillance of the site
    • External information gathering on the facility
    • Alarm avoidance or access to alarms system
    • Physical entry attempts
    • Recruitment of employees/vendors
    • Social Engineering by exploiting the “human factor"

    Data Loss Prevention and Intellectual Property Protection

    SMI Data Loss Prevention and Intellectual Property Protection

    According to the FBI, economic espionage costs American business between $300 billion and $1 trillion dollars each year in the theft/loss of intellectual property and business intelligence. Everyday, businesses from a variety of industries face increasing threats from competitors, disgruntled employees, hackers, and foreign governments. Do not allow your enemies to profit from your company’s research and development. At SMI, our associates are subject matter experts in intellectual property protection and data loss prevention.

    With backgrounds in counterintelligence, cyber security, counterfeit investigations, and counter-espionage, our team stands ready to assist with:

    • Brand Protection & Mitigation Strategies
    • Data Loss Response and Recovery Procedures
    • IP Vulnerability Assessments
    • Internal/External Investigations
    • Competitive Intelligence Reports
    • Employee Counter-Espionage Training

    Information Technology Assessments

    Security Management International prides itself on providing our clients with experienced consultants who operate on the leading edge of cyber security.  With backgrounds from the National Security Agency (NSA), Central Intelligence Agency (CIA), and the private defense sector, our team of IT professionals are subject matter experts in terms of performing cyber security assessments, computer forensics investigations, as well as other customized technical solutions.

    At SMI, our IT capabilities include:

    • Systems Integration
    • Network Simulation
    • Technology and Product Due Diligence
    • Advanced Concept: Mesh Overlay Technologies
    • Customized Communications Solutions
    • System and Application IV&V
    • Advanced Concept: Wireless Networking
    • Customized Security and Tool Sets

    No matter what your cyber security needs, SMI professionals stand ready to assist.

    SMI also offers training courses for executives and business travelers. Click to find out more about our Traveler Safety Courses including: Business Traveler Safety and Counter-Espionage Course, Kidnapping and Awareness Course, and Hostile Travel Course.

    In addition, SMI provides Security Consulting, Security Management, and Intellectual Property Protection for executives, business owners, and Fortune 500 companies.

    Big Data Analysis

    SMI Big Data Analysis

    It is no surprise that “big data analytics” has become the latest buzzwords in in the security sector. Analyzing huge volumes of data can help you uncover market patterns and trends, reveal relationships between individuals and organizations, and often predict future events. By studying the mass of data available within your industry, you will be able to be more informed and make better decisions.

    Yet, in an ever-expanding world of information collection, the overload of data entering your organization can seem overwhelming to manage. While the capacity to gather mass-market data has become routine to most businesses, the ability to quickly decipher and determine how this information is relevant to strategic planning, typically remains a challenge.

    At SMI, our team of professional intelligence analysts uses proprietary software that can take the burden off your organization’s shoulders. Let us perform your data mining, forecasting and predictive modeling in order to help you stay better informed and make better decisions.

    Technical Surveillance Countermeasures (TSCM)

    Technical Surveillance Countermeasures TSCM

    Technical surveillance is the use of optical, audio, or electrical devices or systems to secretly collect information. As such, technical surveillance is a high-impact information security threat that affects businesses and governments alike.

    In today’s global business environment, it is essential to prevent the compromise of trade secrets and sensitive information. To protect your bottom line, reputation, and competitive edge, SMI is offers sophisticated Technical Surveillance Countermeasures (TSCM), which can detect, locate and defeat modern surveillance threats. Allow the experts at SMI to bridge the gap between your organization’s cyber and physical security by analyzing the total environment for information security threats.

    SMI can deploy its dedicated TSCM sweep team to your site to conduct a full TSCM inspection, including radio frequency analysis, telephone integrity testing, electronic cable and wire testing, and detailed physical inspections of the following:

    • Executive offices
    • Conference rooms
    • Laboratories
    • Residences
    • Vehicles/Yachts

    Country Threat Assessments

    SMI Country Threat Assessments

    The need to understand the realities of other nations is vital to doing business internationally. In a global economy where emerging markets have sparked the investment interests of many, the ability to understand a country’s political risk, security threats, and other uncertainties is vital to an organization’s decision-making process.. Before you invest, you need to know the on-the-ground truth about a country, not just what can be uncovered from a few clicks of an Internet search. 

    At SMI, our country threat assessments can provide your organization with the information you need regarding an unstable political environment, economic and industrial espionage concerns, corruption and scam warnings, crime statistics, security studies and scenario forecasting.  Allow us to help you minimize your risk to foreign market entry.

    Maritime Security Anti-Piracy Operations

    Maritime Security and Anti-Piracy Operations

    “70% of the world is covered by water, 80% of all people live near water, 90% of all trade travels by water.” Thus begins a 2012 commercial produced by the United States Navy, demonstrating how central our waterways remain in a modern world. Here at SMI, we recognize that being a truly global security provider means making Maritime Security and Anti-Piracy Operations a central feature of any defense apparatus. That is why we offer an entire suite of boutique maritime security services, each tailored to your precise needs.

    All SMI onboard agents are former British military with specialized training in Indian Ocean piracy. The techniques our operators utilize are uniquely designed to minimize the risks exposed to crew, while maximizing the impact with which agents may respond to threats. In addition to onsite enforcement, SMI can provide personalized Target Analyses of both ports and vessels, as well as coordinated Emergency Plans written specifically to address gaps in maritime security and highlight local strengths.

    Our maritime security services include:

    • Threat and Vulnerability Assessments of:

    - Ports
    - Cargo Vessels
    - Personal Yachts
    - Waterfront Properties

    • Anti-Piracy Agents:

    -  Trained Agents- International
    Waters Escorts
    - EOD Divers
    - Crisis Intervention Specialists

    • Analytics and Intelligence:

    - Investigative Research Team
    - Emergency Planning Specialists
    - Crisis Simulation
    - 24 Hour Emergency Monitoring

    Security Management International’s Critical Infrastructure Protection Division has the capabilities and resources available to rapidly respond to your organizations requirements for comprehensive threat and vulnerability assessments and emergency response planning. 

    Event Planning and Security

    Event Security and Planning

    It is an unfortunate truth that any public gathering or event has become a target for political dissidents or radical terrorists. Yet securing such gatherings is a highly complicated task requiring the integration of hundreds of moving parts. It is for this reason that Security Management International strictly employs professionals with decades of experience in performing Event Planning and Security for the Secret Service, urban police departments, the CIA, FBI and Armed Forces. No matter the country, venue or principle, SMI is committed to providing clients with the highest quality security planning, logistics and management of large attendance events.

    Some of the services SMI offers include:

    • Supplemental security officers
    • Metal detectors
    • Surveillance equipment
    • Trained bomb technicians
    • Mobile command posts and communications centers
    • Perimeter access controls
    • Coordination with local law enforcement
    • Route planning
    • Executive protection for high-risk principles
    • Armored vehicle transportation
    • Private jet coordination
    • Customs expedition in select countries

    School Security

    SMI School Security

    It is a sad fact, but schools are becoming soft targets for active shooter events and gang violence. Students are more vulnerable to external threats than ever before. For this reason, SMI has partnered with some of the most highly respected law enforcement experts on the subject. Our consultants – who have been recognized as “Gang Officers of the Year” - can provide your school with threat and vulnerability assessments, help identify/decode gang “tagging” (graffiti) symbols, train your staff to recognize gang violence precursors, and establish emergency response protocols should an incident occur.  School security is too important not to be taken seriously. 

    SMI also offers training courses for retail and terrorism threats. Click to find out more about our training courses including: Emergency Planning, Crisis Response, Threat Detection & Terrorism Awareness, Managing the Threat of Explosive Devices, and Combating Terrorist Explosive Attacks.

    In addition, SMI provides Security Consulting, Security Management, and Intellectual Property Protection for executives, business owners, and Fortune 500 companies.

    Emergency Response Planning

    SMI Emergency Response Planning

    At SMI, we believe that failure to prepare equates to preparing to fail.  As part of our core areas of expertise, SMI will review and re-write your organization’s existing Emergency Response Plan (ERP) and incorporate new components as may be needed and update the entire document to reflect current national standards.  This up-dating procedure will address the new methodologies for developing preparedness and response capabilities as outlined in the newly revised National Response Plan (NRP), the National Incident Management System (NIMS) and the National Preparedness Guidelines (NPG).

    At a minimum, SMI strongly believes that any emergency operations plan should:

    • List coordinated agencies;
    • Identify responsibilities for agencies, teams, and employees;
    • Comply with government regulations;
    • Ensure proper communication and continuity between intergovernmental and interagency response teams;
    • Describe local population notification procedures; 
    • Identify containment procedures (fire, chemical, biological, radioactive, flood, etc.); and
    • Describe response actions and back-up measures.

    Additionally, the plans should establish links to government agencies to facilitate interagency and intergovernmental planning, training, exercising, coordination, and information exchange. 

    SMI is proud to have nationally recognized subject matter expert Pablo Gonzalez as our Director of Crisis Management and Emergency Preparedness.

    Mr. Gonzalez and his team will assist in developing compliance and concurrence with all of the latest national planning guidelines, concepts and doctrines such as:

    • NIMS- National Incident Management System
    • ICS- Incident Command System
    • SNS- Strategic National Stockpile
    • NRF- National Response Framework
    • JOC- Joint Operations Centers
    • ESF- Emergency Support Functions
    • NPS- National Planning Scenarios
    • UTL- Universal Task List

    SMI also offers training courses for government, military, and business professionals. Click to find out more about our training courses including: Emergency Planning, Emergency Plan Writing, Crisis Response, Threat Detection & Terrorism Awareness, Managing the Threat of Explosive Devices, and Combating Terrorist Explosive Attacks.

    In addition, SMI provides Security Consulting, Security Management, and Intellectual Property Protection for executives, business owners, and Fortune 500 companies.

    SMI - Security Management International in Media
    security consulting education
    SMI - Harvard Business Review
    SMI -  Buisness Insider
    SMI -  International Spy Museum
    SMI - Logo

    SMI Social Media

    White Papers