Product Details

Detailed information on platform functionality.

All Product Details

Image Transport Safety

transport safety icon

Destination Safety

On any trip abroad, even to countries thought to be safe, it is important to consider the cultural and social differences. Conflicts or adverse situations might be more difficult to handle away from home, especially if the language is unfamiliar. Some habits and customs that are common in one’s home country might be disrespectful or even criminal in some places. This course highlights risks and advice on how to act in many different situations.

Image Destination Safety

destination safety icon

Cyber Safety

This course covers the topic of cybercrime, which comprises any criminal act involving computers and networks, as well as traditional crimes conducted through the internet. The prevalence and cost of cybercrime, including identity theft, hacking of bank accounts, and loss of intellectual property, has ramped up significantly over the last decade. This course provides key insights on how to identify different types of cybercrime attempts in order to avoid them to the greatest extent possible.

Image Cyber Safety

cyber safety icon

Travel Health Risks

A traveler may be exposed to a variety of health risks in unfamiliar environments. Most risks can be minimized by taking precautions before, during, and after a trip. We list such precautions in this e-learning course.

Image Travel Health Risks

travel health risks icon

Crowd Safety

Navigating crowded spaces is common when visiting large cities. Travelers will often arrive at busy stations and airports. They sometimes may have to pass close to high-risk events, such as political rallies. Large crowds may cause disruption to public transport, making it difficult to navigate the city. This course teaches preventative measures that will help reduce those risks.

Image Crowd Safety

crowd safety icon

Female Travelers

Women may face additional security risks while abroad. This course, which is intended for both men and women, explores the various risks women travelers can face in order to help avoid dangers and better enable providing assistance to others.

Image Female Travelers

icon female travelers

LGBTQ Travelers

Members of the LGBTQ community may face unique issues when traveling that are dangerous to neglect. In some parts of the world, acceptance for people identifying as LGBTQ may not be what travelers are used to in their home countries, such as discrimination or targeted violence. This course highlights such potential risks of LGBTQ travelers and lists what to read up on before traveling, such as the legal environment, potential cultural biases in that country, etc.

Image LGBTQ Travelers

lgbtq icon

Terrorism and Casualty Attacks

Terrorism has been a serious threat for a long time. Terrorist attacks are often directed against civilians and tourists to generate the greatest amount of publicity. This course teaches travelers what to look for in terms of potential vulnerability in their surroundings.

Image Terrorism and Casualty Attacks

terrorism icon

Carjacking

Carjacking is a form of robbery where a criminal forcibly removes a motorist from their car and steals it. Perpetrators of carjacking often wield firearms. In some parts of the world, this form of crime is a pervasive problem, while it is largely unheard of in other countries. This course explores what to know about carjacking and steps to protect against it while traveling.

Image Carjacking

carjacking icon

High-Risk Locations

This course provides information about what to expect before traveling to higher and extreme risk locations, such as war zones or former war zones, often called hostile environments. A hostile environment could be defined as an area that is extremely volatile, with widespread conflict, localized insurgencies, criminal gangs, or ongoing violent civil unrest that are affecting businesses, visitors, and the local population.

Image High-Risk Locations

high-risk location icaon

Home Page

On the Home Page of the Safeture Mobile Application, you’ll find a summary of the latest alerts relevant to you, based on your location, and a list of your upcoming travel bookings. At the top bar, you have quick access to your privacy settings and a Check-In button for manual location reports.

Image Home Page

home screen

Alerts

The Home Page of the Safeture Mobile Application has a feed with the latest alerts relevant to you. Your privacy settings will influence what alerts are shown since they are filtered based on your location. The more exact location you allow, the more relevant the alerts you will receive. If you select additional countries of interest in the settings, you will also see those alerts in the feed on the Home Page.

When you receive a medium- or high-risk alert, you can confirm that you are OK by pressing the I’m OK button inside the alert. The Safeture Platform then informs the Administrator about your well-being. This input will help the potential Assistance Providers or your own Administrator(s) to follow up only with those who have not confirmed they are OK or have clicked the Emergency button.

Read more about the risk assessment methodology.

More information on the alert publishing process.

Since alerts are distributed based on your last known location, your privacy settings will directly impact what alerts you will receive. With a region or state level set, you will get all alerts within that region or state. You can also select a country of interest to get alerts from even though you are not currently located there.

Image Alerts App

alert

Privacy Settings

We highly value end-user privacy and therefore give end-users the option to set their own privacy level by themselves in the Safeture Mobile Application. There, you can choose between the following privacy levels:

  • Exact

The exact GPS coordinates will be used to represent the end-user’s location.

  • City-level

City-level means that the end user’s location will be anonymized to a 20 x 20 km square, giving a bit more privacy, but while still being able to receive relevant alerts based on a fairly accurate location.

  • Region/State

Region/State means that the app will resolve which region or state the user is located within and send use this as the end-user’s location.

Image privacy settings

privacy settings

Check-In Button

The Check-In button is located at the top of the Home Page and is used to send up-to-date location reports to the Safeture Platform with respect to your privacy settings. Normally, the app sends location reports at intervals, so in most cases, the button provides a way to make sure an up-to-date location is sent.

If Scheduled Check-Ins are added as an additional service, Administrators can set certain dates and times when end-users will get notified to check in as a safety measure. If a check-in deadline is missed by one or several users, the system will trigger notifications to alert the Administrator.

Image Check-in Button

Check-in button

Emergency Button

In the middle of the bottom bar inside the Safeture Mobile Application is the Emergency button. When you tap it, you are directed to the Emergency section containing several different emergency numbers. At the top, you will find one or more SOS buttons (depending on the account setup). Tap on it to enable emergency mode. The Safeture Platform will inform both the Safeture Administrators and your security/medical providers simultaneously (if integrated into the platform) about the emergency. While in emergency mode, Safeture automatically informs your security provider of your current location for prompt assistance. 

Note: You can share your location and initiate emergency mode via SMS even if your mobile device cannot access the internet when you are experiencing an emergency.   

In the emergency section, you will also have access to all local emergency numbers, which are automatically updated based on the country where you are located. Finally, the emergency section also contains a link to a map view plotted with all nearby healthcare providers.

At the top of the Emergency section of the Safeture Mobile Application, you will find two tabs. Navigating to the Location tab will enable you to quickly share your location.

Image Emergency Button

emergency button

Country Information

Click on the globe icon in the bottom menu to find country-specific information for the country you are in  or a manually chosen location. The country information in the app is identical to the Country Information module in the Safeture Web Portal.

Image Country Information

country information

Image Medical

medical

E-learning

Safeture’s E-Learning program offers advanced training for employees. It contains a variety of courses that provide insights for safer travel. These include courses on Travel Health Risks, Crowd Safety, Women Travelers, High-Risk Locations, and many more.

Read more about our E-Learning program on Safeture’s website.

Image E-learning App

e-learning

Providers – Medical and Accommodation

In the Providers tab of the Safeture Mobile Application, you will find a map view for both Medical and Accommodation Providers to help you locate the nearest hospital or safe hotel. In the filtering menu, you can choose to only show Safeture-preferred medical providers. Note that medical providers might only be displayed depending on your account setup.

Image Providers

Providers

Travel Bookings

On the Home Page, you will also find a list of all your upcoming travel bookings. Click on one of them to find detailed travel information for that trip. You will get push notifications for flight disruptions or gate changes and pre-travel advisories.

Image Travel Bookings

travel bookings app

Alert Publishing

Incidents are first detected through proprietary data gathering tools, scanning thousands of information sources. The system also has a built-in auto-translation capacity to manage sources in a variety of languages.

These are a few of the types of data sources used to gather information on incidents:

  • News (International and Regional)
  • Seismological institutes
  • Meteorological agencies
  • Departments of Foreign Affairs
  • Other Government Agencies
  • Social Networks and forums (Crowdsourcing)
  • Aid organizations and other NGO’s
  • Meta-data aggregation
  • Health and Disease Surveyors
  • Safeture Incident and Event Database (all events and incidents that Safeture process are tagged and labeled)
  • Strategic Partners
  • Social Media

After data gathering, the information first goes through automatic filtering by an Artificial Intelligence (AI) system (semantic relationships) plus a list of keywords to search for. A secondary manual filtering is done by Safeture’s team of analysts, consisting of 20 analysts, based in Brazil, Sweden, and Malaysia working 24/7/365 days per year covering all time zones globally. They then verify the data, define the impact radius, severity, and finally, publish the alert. We maintain absolute control and ownership of all the content provided and have the last say on any evaluation or assessment put forward to clients and partners.

The impact radius is dynamic and varies depending on the incident. For instance, a shooting is seen as a very local incident while an earthquake might have countrywide effect. The radius of the incident is set based on the incident category and how widespread the effect is. They are set with an interval between 10 km and 1000 km. Event radius crosses borders and may be set as nationwide. Minor incidents, such as traffic disruptions, civil unrest, and events, start within a 10 km radius. Natural disasters span a large radius interval, with the most widespread tropical storms ranging upwards 1000 km.

If the incident is seen as critical, an initial message will be published and sent to clients in the affected location within 5-15 minutes from when a source initially reported about the incident. We are capable to do so due to the integrated information mining system, message publication system, and our highly automated process. Sometimes robot publication is used where the time between source input to message (SMS, push notification) publication and send-out is required to be short and where the source is highly credible, such as automated tsunami warnings. 

On publication of an alert, the Safeture Platform will automatically send out an alert about the incident to all end-users that are within the impact radius. By “Favoriting” a region, end-users will receive newly published alerts for that country even if they are not traveling to, or within, that country. The alert will show as a notification, and when pressing the link or notification, the end-user is presented with an alert overview. A map will show the incident location, the risk level, and the distance from their current position to the incident location.

The Safeture Platform will also notify relevant Administrators in the Safeture Web Portal (own/service providers) if any employees were impacted by the alert. To Administrators, alert notifications are sent via email and can be configured to send via SMS also.

Positioning methods

The Safeture Platform uses a variety of methods and functionality to locate employees. The locations of your employees are continuously uploaded to Safeture servers, all in compliance with GDPR.

Below you find all these methods listed and explained:

1. Mobile Application Positioning

The Mobile Application Positioning is used for active monitoring. If activated, the Safeture Mobile Application automatically sends location data without any manual input by the end-user. The location is based on GPS, WIFI network, VPN, and Mobile Network connections.

  • WIFI

Being connected to WIFI increases the likelihood that your position reporting will be inaccurate compared to your “true” location. In practice, the position of your internet base station or router, i.e., probably set by your internet provider, will be used as your actual position.

  • VPN

Similar to WIFI, being connected to VPN significantly increases the likelihood that your position reporting will be inaccurate compared to your “true” location. Depending on the VPN setup, it may report your position in a different state or country for privacy purposes. Using VPN can make your device believe that you are at a different location than your real location and thereby report a “false” location on the Safeture App.

  • Mobile Networks

This is the best option for getting an accurate position. In this case, with a strong cellular network connection, your position can be determined by triangulation and GPS (trilateration), theoretically depicted in the graphic. Hence, being in a basement usually decreases the accuracy, while being outdoors increases position accuracy significantly. Also, turning on Bluetooth improves location accuracy as Apple location service utilizes it in reporting positions.

2. Travel Booking Data

The platform will use the itinerary location of a trip as that person’s location, which requires integration with a Travel Management Company, parsing through email, or manual input of travel data.

3. Manual Check-In via the Safeture Mobile Application

The end-user can also manually check-in by pressing the check-in button in the app, which will send that person’s location to the Safeture Platform.

Travel Data Integration

Travel booking information is a key component of the Safeture offering. We integrate with all Travel Management Companies (TMCs) and Global Distribution Systems (GDSs), so Safeture can automatically import all travel booking data. During the onboarding process, Safeture will contact your travel providers and arrange for the connection between the travel providers and Safeture. Safeture has connections to all GDS providers and TMCs.

An agreement between you and the TMC that allows the TMC to send copies of the Passenger Name Records (PNRs) to Safeture needs to be set up beforehand. When the agreement and identifiers are in place, the TMC can send copies of the PNRs to Safeture via the GDS.  

For bookings that are not connected to GDS, we can provide an SFTP that the TMC can upload bookings to.  

When the TMC makes a booking for the client, a copy should be sent to the Safeture queue in the GDS. Safeture regularly monitors the queue for new PNRs. PNRs will be parsed by Safeture, and, when detected, will be determined if they’re completely new bookings or contain updates and cancellations.

Traveler identification is done via phone number, email, frequent flyer ID, and name. If a trip contains several bookings, it will be pieced together for the end-user and displayed accordingly. We support PNRs that have more than one traveler.  

The PNR queue on Amadeus and Sabre is scanned every 15 minutes. The TMC needs to re-queue the PNR for the update to be visible. Each PNR is updated at a regular interval before each departure segment. For TravelPort, updates are done when new updates are received. 

For bookings made outside of default TMCs, users can use email parsing, where travel booking confirmations are emailed to a defined email address. A third option is to manually add a travel booking in the Travel module within the Web Portal.

Risk Assessment Methodology Overview

All alerts published in the Safeture Platform are assigned both a risk level and one, or several, risk categories by the Safeture analysts. The country-specific risk assessments are categorized into the same ten risk categories but have five different risk levels. Below you find in-depth information on the risk assessment methodology.

Risk Categories – Alerts

Airstrike: attack conducted by an aircraft (including UAV).

Armed Conflict: armed clashes between two or more state actors or aspiring state actors involving conventional warfare tactics.

Civil Unrest: violent gatherings (be it riots or violence on behalf of protesters, or forcible dispersal by security forces).

Crime: opportunistic and/or smaller scale than organized crime.

Cyber-attack: conducted via cyberspace.

Developing: any incident with potential immediate effect with yet unclear circumstances, which requires immediate notification to clients before all details are clear (for example- an explosion may be a suicide bombing or a gas cylinder accident, but nonetheless needs to be reported immediately so that mitigating actions can be taken).

Earthquake: shift in tectonic plates, Earthquakes can range in size from very weak to catastrophic.

Fire: a large and destructive inflammation event that may threaten human life, health, and/or property.

Health: medical threat to peoples’ wellbeing or interference of medical installations.

Holiday: celebration/occasion that results in travel/operational disruptions.

Labor Action: strikes of different levels, from local disruptions to complete shutdowns.

Militancy: armed clashes involving at least one side that employs unconventional warfare tactics.

Organized Crime – racketeering, extortion, blackmail, trafficking and any large-scale organized criminal activities.

Piracy – criminal attack targeting naval vessel.

Politics – changes in policies/strategic developments which may impact travel/operations.

Protest – gathering of a number of people to demonstrate their shared public ideas.

Rocket/Mortar – usage of standoff weapons in a capacity other than airstrikes.

Service Failure – water/electricity/communications outages, etc.

Travel – any incident that would impact travel and does not fall in line with the other categories (for example: road work).

Volcano – eruption of hot lava, volcanic ash, and gases.

Weather – unusual weather conditions that may pose risk to human life, property and business continuity.

Risk Levels – Alerts

  • Low Risk

Information that may be good to know, such as public transport disturbances, minor demonstrations or updates of previous security warnings.

  • Medium Risk

Incidents or threats that may occur in the coming days or recently have occurred.

  • High Risk

Immediate and serious threats to your safety and/or health.

Country Risk Assessment – Negligible Risk

The likelihood and potential consequences of a threat are so low that no or only very basic mitigation measures are necessary.

  • Civil Unrest: Stable economic and political situation. Infrequent and non-violent protests. Protest issues are effectively resolved within the accepted legal framework. Labor situation is largely stable with infrequent localized strikes. Inter-communal harmony.
  • Crime: Crime rates are very low and typically limited to certain areas. No specific threat to foreign personnel or assets No to low-level organized crime. Effective law enforcement.
  • Environment: Environmental hazards are limited. Conditions may cause limited disruption to organizations or individuals but are predictable and manageable.
  • Health and Medical: Medical facilities are effective and easily available. Common aliments pose no specific additional risk.
  • Infrastructure and Transport: Extensive and resilient Critical National Infrastructure (CNI). Transport system is extensive, safe, and reliable.
  • Insurgency and Armed Conflict: No modern precedent for internal armed conflict. No known separatist groups.
  • International Relations: Diplomatic relations are amicable. No precedent for dispute.
  • Kidnap: Kidnap incidents are rate, isolated, and not part of any specific organized criminal activity.
  • Political Stability: Political system is very stable, with a high standard of governance. Economic conditions are generally very good.
  • Terrorism: No evidence of terrorist groups operating in the area. No history of terrorist attacks. Location is not known as a focal point for extremism. Security forces display a very high level of professionalism and capability in preventing and responding to acts of terrorism.

Country Risk Assessment – Low Risk

  • Civil Unrest: Infrequent to regular protests cause some disruption. Occasional strikes cause localized disruption but are neither systemic nor sector-focused. Localized inter-communal tension and rate violence between individuals. Mass peaceful protests. Security forces are able to contain protests or disperse with acceptable levels of force. Violent clashes are rare.
  • Crime: Crime rates are low. Small-scale activity by organized criminal groups, including drug and human trafficking, counterfeiting. Periodic isolated incidents of violence between rival criminal groups; overall civilian impact low. Law enforcement and legal institutions generally robust.
  • Environment: Environmental hazards can cause damage or harm but are predictable and manageable. Extreme environmental events occur seasonally. Natural disasters occur but are usually small-scale. Conditions can disrupt travel and commodity supplies in affected areas. Conditions can impact local infrastructure/telecommunications. Effective disaster management bodies and safety standards.
  • Health and Medical: Medical facilities fair. Vulnerable individuals may be especially susceptible to a range of communicable diseases, but precautionary measures and sanitation can mitigate the risk.
  • Infrastructure and Transport: CNI (Critical National Infrastructure) is resilient but with precedent for elements failing for short periods of time (less than 24 hours) Transport system is effective but not extensive.
  • Insurgency and Armed Conflict: Government legitimacy is contested peacefully. Domestic political issues generate low levels of violent protests. Groups with separatists or anti-government agendas exist but lack intent and/or capability to use violence. Precedent for internal armed conflict.
  • International Relations: Ongoing low-level diplomatic disputes. Precedent for escalated, yet non-violent disputes. Belligerent diplomatic communications regarding specific issues. Nationally targeted cyber-attacks. Threats made by other countries that military action may be taken in relation to a specific issue(s).
  • Kidnap: Kidnap incidents occur regularly but remain mainly within criminal circles or have business/personal motivations. Some fatalities of victims. Targets may include foreign travelers involved in express kidnappings.
  • Political Stability: Political system is mostly stable, with predictable governance structures. Civil society tensions exist but are manifested peacefully. Political debate generates small-scale tension. Economic conditions are generally good Individual cases of public sector corruption.
  • Terrorism: Credible evidence of terrorist groups active, albeit at a low level. Precedent for terrorist activity in the past decade. Opportunity and capability for terrorist action is limited. Isolated areas or certain groups may face a specific threat. Security forces display a high level of professionalism and capability in preventing and responding to acts of terrorism.

Country Risk Assessment – Medium Risk

The likelihood and/or potential consequences of a threat are such that robust mitigation measures are recommended. Professional support might be required in some areas.

  • Civil Unrest: Frequent protests often cause disruption. Strikes affect multiple sectors or cause shutdown in a single sector. Security force capability is generally satisfactory but presence at demonstrations sometimes results in violent clashes. Foreign interests may be affected but are not generally targeted, Communities polarized, with regular small-scale violence.
  • Crime: High crime rates in some areas. Organized crime groups are well established. Known production/transit point for illicit goods on international market. Frequent incidents of violence between criminal groups. Clashes involve law enforcement agencies. Ineffectual law enforcement and legal institutions.
  • Environment: Environmental extremes occur seasonally and are generally predictable. Natural disasters occur with some regularity, Disruption to commodity supplies/business continuity in country. Frequent loss of life to environmental factors is common. Inconsistent emergency response in some areas.
  • Health and Medical: Good-quality medical care is limited to major urban areas. A range of communicable diseases exist, but precautionary measures and sanitation can mitigate the risk. Inconsistent emergency response.
  • Infrastructure and Transport: CNI (Critical National Infrastructure) is not extensive nor resilient and is sometimes unable to cope with demands placed upon it. The transport system is unsafe, unreliable, and ineffective. Major routes are blocked for short periods with some regularity. Sporadic disruption to basic commodity supplies. Some disruption to telecommunication systems. Power cuts are frequent.
  • Insurgency and Armed Conflict: Government legitimacy is challenged by armed non-state actors with the intent to secede or overthrow the government. Government capacity to deliver essential services, including security, across territory is challenged.
  • International Relations: Ongoing diplomatic dispute with precedent for armed conflict. Targeted/partial sanctions. Diplomatic negotiations in quagmire. Small-scale border incursions by hostile powers with violence limited geographically. Security forced on increased readiness and/or deployed to protect critical national infrastructure. Foreign governments recall non-essential staff.
  • Kidnap: Kidnapping are systematic as part of organized criminal activity with some violence and occasional fatalities involved. Express kidnappings of foreign nationals occur more widely and some explicit targeting of expatriate community. Kidnap for ransom of foreign nationals occurs sporadically. Some evidence of complicity of state actors.
  • Political Stability: Political stability faces challenges. Dissent against political regime include violence in localized areas. Government capacity to deliver essential services across territory is challenged. Social and economic conditions contribute to unrest. Significant levels of corruption. Political leaders and state officials have links to criminal organizations and other threat groups.
  • Terrorism: Terrorist groups are active in the area and demonstrate both intent and capability to carry out attacks. Opportunity for attack is limited. Precedent for terrorist attacks – including mas-casualty incidents – but such occurrences are infrequent or historical. Security forces are under-resourced when combating terrorist threat.

Country Risk Assessment – Critical Risk

Both the likelihood and potential consequences of being affected by a threat are so severe that most mitigation measures are either unavailable or ineffectual. Professional support is required.

  • Civil Unrest: Mass violent protests occur very frequently. Demonstrations have a critical impact on business continuity and violence is large-scale. Security forces are unable to deal with violence at demonstrations. Rioting is a very regular occurrence causing considerable economic damage and a major threat to human life.
  • Crime: Virtual breakdown in law and order. Illegal goods and organized crime form large part of economy. Organized crime forms a large part of the economy. Organized crime groups control avenues of power and operate with autonomy. Law enforcement/forces incapable of countering criminal activity. Criminal groups better armed and informed than national authorities.
  • Environment: Environmental disaster underway. Consistent environmental disasters make areas inhabitable/force mass evacuations. Transport and basic services are vulnerable to devastation. Substantial loss of life, consistent exposure to inhabitable conditions. No government institutions/ emergency services to prevent or respond to disasters.
  • Health and Medical: Medevac required for any treatment /medevac not available. Epidemic of fatal communicable disease.
  • Infrastructure and Transport: CNI (Critical National Infrastructure) has completely failed. Freedom of choice in terms of transport options is extremely limited. The supply of essential commodities is very infrequent.
  • Insurgency and Armed Conflict: Civil war. Separatist groups undermine territorial integrity to the extent that there is no recognized central authority. Multi-polar conflict involving several insurgencies.
  • International Relations: Intensified / total conflict in the area and general mobilization of armed forces. Use of extraordinary military capabilities (i.e. nuclear, biological, or chemical weapons).
  • Kidnap: Kidnap is widespread. Confirmed complicity of state actors. All protective measures to reduce kidnap threats are rendered null and void or non-existent.
  • Political Stability: Governance structures are highly ineffective or non-existent. Violent coup and/or anarchical situation. Comparatively equal centers of rival political power in violent opposition. Central government and state institutions are powerless or non-existent.
  • Terrorism: Terrorist intent, opportunity, and capability are extreme, and attacks frequently cause mass-casualties. There is widespread support for terrorist aims and methods in the area and active involvement in support and recruitment of terrorists is evident. Security forces provide few or no effective countermeasures.

Country Risk Assessment – High Risk

The likelihood and/or potential consequences of a threat are at such a high level that professional support is likely required in order to mitigate the risk.

  • Civil Unrest: Large-scale protest actions occur frequently and cause signitifant disruption. Strikes cause complete shutdown of entire industries or sectors. Security forces struggle or are unable to cope with protests and instead cause antagonism, often resulting in violent clashes. Rioting occurs periodically causing economic damage and potential threats to human life. Regular mass violence between polarized communities.
  • Crime: Crime levels are too high for security forces to adequately cope. Low-level criminals routinely carry firearms. Major producer/transit point for illicit goods. Criminal groups are well-armed. Sustained clashes involving law enforcement agencies. Organized criminal activity is evident throughout society. Law enforcement is incapable of effectively countering organized crime: effort to counter criminal institutions result in violent intimidation.
  • Environment: Regular extreme environmental hazards or natural disasters, difficult to predict and manage. Inadequate and ill-prepared emergency response. Consequences include disruption to commodity supplies/business continuity. Large loss of life. Weak government institutions/emergency services to prevent disasters.
  • Health and Medical: Limited medical facilities even in major cities – medevac likely required. Multiple communicable diseases with few precautionary measures adopted or epidemic of fatal communicable disease. Inadequate and ill-prepared emergency response.
  • Infrastructure and Transport: CNI (Critical National Infrastructure) is failing with regularity. CNI is limited and unable to cope with demands placed upon it by local and foreign nationals. Tranport options are limited, and major routes are blocked for prolonged periods of time. Essential. Commodities (fuel, food, and water) are in short or irregular supply. Power and other utility supplies are cut with frequency (several times per day) and for periods longer than six hours.
  • Insurgency and Armed Conflict: Government legitimacy is challenged by well-armed non-state actors with both intent and capability to overthrow government. Well-armed separatist groups pose a significant threat to territorial integrity. Government control is removed over part of the country. Armed groups pose a threat to major economic centers outside areas of their control.
  • International Relations: Conflict in the limited geographical area utilizing conventional forces. Wide-ranging sanctions and international isolation. Overt threats to further escalate levels of violence or geographical spread. Foreign governments remove all staff.
  • Kidnap: Kidnap is widespread. Use of violence prevalent; moderate numbers of fatalities registered. Terrorist groups and other non-state actors use kidnapping to elicit financial or political randoms. Explicit intent to target expatriate community. Evidence of complicity by state actors.
  • Political Stability: Political system is highly unstable. New center(s) of rival political power growing, with increased chances of a coup. Violent dissent against the government. Overt threats of military intervention. Corruption is very high in both public and private sectors. Juridical system and law enforcement are under resources and/or fraught with corruption.
  • Terrorism: Terrorist attacks are frequent. Mass-casualty attacks have occurred. Security forces provide inadequate risk mitigation. There is widespread support for terrorist aims and methods in the area. The potential for regular mass-casualty attacks is high.