Abstract

Foreword The Rt. Hon. Sir John Wheeler PC JP DL, Chairman, Service Authorities for the National Criminal Intelligence Service and National Crime Squad Foreword Dan Pinck (ex CIA) Acknowledgements Introduction Part One: Invisible Risk and its Impact on Investment 1. Operating in overseas markets 2. Invisible risks Grey Area Dynamics MIG's ten GADs and their sub sections The iceberg 3. The problem with strategy Direction Information collection Analysis and planning Bargaining Decision-making 4. Understanding culture Business integration Case study: South Korea] 5. Bureaucracy, corruption and FDI Bureaucracy and liberality of investment regimes Corruption Case study: Indonesia (1) Case study: Indonesia (2) 6. Legal safeguards Case study: Poland Case study: CIS/Ukraine/Russia 7. Criminal activities Counterfeiting and Fraud Case study: Russia Case study: European Union 8. The good, the bad and the unethical Case study: Burma Case study: Royal Dutch/Shell 9. Other headaches Extremism Unfair competition Case study: Russia Case study: industrial espionage 10. A little light relief Part Two: The World's Troublespots 11. Introduction Religious fanaticism and creeping Islam International organized crime syndicates 12. Origins of the threat to business 13. Political terrorist groups 14. Global scenario update 15. Risk ratings 16. Middle East - the Saudi domino effect Instability in Saudi Arabia Expanded US operations against Iraq Re-radicalization in Iran Higher intensity Israeli-Palestinian conflict Instability in Turkey 17. Latin America Regional recession 18. Asia Pacific Indo-Pakistani conflict over Kashmir US operations extended into Pakistan US operations extended into Pakistan A widened Sino-Indian war A new Taiwan crisis A Korean crisis Islamic revolution in Indonesia 19. The lesser risks - country by country Asia and the Far East Europe and the Former Soviet Union The Middle East Latin America Africa Part Three: Threat and Defence 20. Introduction Extortion/blackmail Kidnapping or hostage-taking Political terrorism 21. The defence of buildings, personnel and stock The threat from direct action groups Protection after the blast Chemical and biological threats Evacuation of buildings on receipt of a warning or after terrorist attack Defence of stock Cybercrime 22. Proactive & precautionary measures Personal security International travel Documents and currency Medical Airport safety Hotel safety Street awareness Security when mobile Portable computer and mobile telephone security Security at home Child safety Leisure Women travellers Attack and kidnap for ransom Personal reactions Coping with captivity Safeguarding your family Response to a kidnap call Dealing with bombs Part Four: Conclusions 23. Conclusions Appendices References About the Authors About MIC Merchant International Group (MIG) Publications Index

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.