Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/controllers/MeprApiCtrl.php on line 209

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/controllers/MeprApiCtrl.php on line 209

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/lib/MeprUtils.php on line 862

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/lib/MeprUtils.php on line 862

Warning: Cannot modify header information - headers already sent by (output started at /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/controllers/MeprApiCtrl.php:209) in /home/newhoslaw/pre.hospitalitylawyer.com/wp-includes/feed-rss2.php on line 8
Travel and Tourism – HospitalityLawyer.com https://pre.hospitalitylawyer.com Worldwide Legal, Safety & Security Solutions Wed, 15 May 2019 01:48:34 +0000 en hourly 1 https://wordpress.org/?v=5.6.5 https://pre.hospitalitylawyer.com/wp-content/uploads/2019/01/Updated-Circle-small-e1404363291838.png Travel and Tourism – HospitalityLawyer.com https://pre.hospitalitylawyer.com 32 32 Virtual Kidnapping in the US and Mexico https://pre.hospitalitylawyer.com/virtual-kidnapping-in-the-us-and-mexico/?utm_source=rss&utm_medium=rss&utm_campaign=virtual-kidnapping-in-the-us-and-mexico https://pre.hospitalitylawyer.com/virtual-kidnapping-in-the-us-and-mexico/#respond Sun, 06 May 2018 01:47:41 +0000 http://pre.hospitalitylawyer.com/?p=14981 The Federal Bureau of Investigation (FBI) and other law enforcement agencies in the United States have issued several warnings related to virtual kidnapping in recent months. This extortion technique has become more prevalent in the US and Mexico since 2013, where the number of reported cases has increased substantially.

What Is Virtual Kidnapping?

In a virtual kidnapping, the criminals make a ransom demand, without actually taking a hostage; rather, the perpetrators negotiate with those from whom the ransom is demanded on the pretext that a connected person has been abducted. Virtual kidnapping can take on many forms; however, it is always an extortion scheme which attempts to coerce victims into paying a ransom fee in exchange for the release of a family member/associate. Criminals typically employ a host of psychological tactics and threaten physical harm to ensure the victim’s compliance. These forms of kidnapping do not require the geographical proximity or resources of traditional kidnapping – for- ransoms such as accomplices, resources, safe houses and capital outlay. Virtual kidnapping has a high risk-benefit ratio in favor of criminals, offering high returns against a low risk of capture or prosecution.

Virtual Kidnapping- Techniques and Methods

Techniques and methods used by criminals to perpetrate virtual kidnappings vary and continue to evolve. A perpetrator will call the victim and convince them to isolate themselves in a specific location out of their family’s reach or to travel to a location of the perpetrators choice, through the use of coercion techniques. Once there, the victim is made explicitly aware of his/her abduction and is held against his/her will by the assumption that they will be harmed, should they escape. Often victims are threatened to switch off their mobile devices, contact no one, which further creates the illusion that they (the victim) has been kidnapped, making the rouse more convincing. These more sophisticated forms of virtual kidnapping require some amount of coordination on the part of the criminal, who may need to do some preliminary investigations prior to initiating the scheme and selecting a potential victim. Criminals often impersonate cartel members as a means of intimidating their victims or lead their victims into believing that they are under surveillance in order to discourage them from trying to contact the abductee or to notify the authorities.

In one of the more common forms of virtual kidnapping, victims are selected at random and criminals use telemarketing techniques and cold-call hundreds of numbers until someone submits. When this technique is employed, criminals may call their victim and mimic screaming or play recorded versions of screaming while threatening to harm their “captive”, often inducing panic. In this state, the victim may instinctively reveal the name of one of their relatives, thus enabling the criminal to gain information directly from the victim while undertaking the extortion. Criminals involved in virtual kidnapping schemes tend to pursue the ‘mass market’, increasing their range of targets and the threat to individuals significantly. Unlike traditional kidnap for ransom, victim profiles vary and are not dependent upon geographical location, language, race or socio-economic factors.

Recent Incident

On Feb. 2, a federal grand jury in Houston, Texas, returned a 13-count indictment against Mexican national, Ismael Brito Ramirez, relating to virtual kidnapping scheme run in several states involving at least 40 victims. The perpetrator, currently incarcerated in Mexico on other charges, is believed to have called various individuals in California, Texas, and Idaho demanding ransom payments on the premise that he had abducted their relatives. The perpetrator threatened violence before instructing his victims to transfer undisclosed sums of money to a number of people in Mexico or to make money drops at specific locations in Houston, TX. Ramirez extorted in excess of USD 28,000 from his victims and has been charged with conspiracy to commit extortion and fraud, interstate transmission of extortionate communications, wire fraud and conspiracy to launder money. 

Virtual Kidnapping Characteristics

Criminals tend to demand wire payments smaller than $2,000 (or the equivalent thereof) within the US to Mexico as there are legal restrictions for wiring larger sums over the border. Occasionally, criminals direct victims to make money drops at locations of their choice within the US, such as San Diego or Houston, which can be smuggled across the border with relative ease. Within Mexico, ransom amounts may vary, depending on the modus operandi employed by the criminal. Criminals typically seek to extort small payments within 24-hours of initiating the extortion; incidents rarely continue beyond a few hours.

Cyber Threat

There is an electronic or cyber risk when considering virtual kidnappings. Malware, spyware or trojans may be used to make an electronic device run an unintended program that allows criminals to gain private or secure information from their intended victim. Phishing scams aim to trick individuals into disclosing private information, such as their social media passwords, to criminals. Phishing scams are usually delivered in the form of official communication from a reputable institution such as a bank or internet service provider. Criminals may convince would-be victims to reset their passwords by delivering an ‘official’ email to the user, thus gaining access to their current passwords. Criminals may also contact the victim informing them that necessary updates need to be made to their mobile software and that their devices would need to be shut down for an extended period of time, rendering the victim uncontactable.

Social media is another aspect when considering potential cyber threats. Sharing personal information online could make you vulnerable to criminals. Social engineering in virtual kidnapping ranges from simple tactics to more sophisticated techniques.  Opportunistic criminals may monitor your current whereabouts online and use it in their extortion scheme. An example of this includes posting your upcoming activities online, such as your intention to watch a film at a local theatre – the virtual kidnapper knows their potential victim’s phone is likely to be off for two hours during movie and may use this time to extort their family members as the intended target may be uncontactable for that time period. More sophisticated tactics involve befriending people on social media to learn more about their habits, wealth or personal life as a means of surveillance. Cybercrime methods have been increasingly employed by criminals when perpetrating virtual kidnappings. This trend is likely to gain momentum as the technical abilities of unsophisticated criminal groups and networks grow.

Statistics and Reporting

Comprehensive statistics on virtual kidnappings are difficult to ascertain for a number of reasons. As many criminals perpetrate these crimes from within Mexico, it is increasingly difficult for US-based law enforcement agencies to investigate and prosecute cases. Ransom money is often wired out of the US, making it challenging to trace. Law enforcement agencies are usually limited to their national jurisdiction or may lack the capacity, skills, and mandate to investigate transnational criminal activity fully.  The poor reporting rate remains a significant challenge in tracking and assessing incidents and trends. In the US, victims may not report incidents out of fear of being targeted again or being stigmatized. Sometimes victims do not report incidents because the payment extorted was nominal and not considered significant enough to report. In Mexico, victims are often unwilling or unable to report incidents due to fears of reprisals and/or concerns over official corruption, collusion or incompetence.

Virtual kidnappings are not formally classified under the penal code. In the US for example, there is a Federal Kidnapping Act, which in most cases classifies traditional kidnapping as a federal offense. Charges of aggravated kidnapping may be laid in the event that the victim has sustained injuries. However, there is no specific act under which a crime of this nature can be charged. Rather, virtual kidnapping-related charges are laid under the federal criminal code. Charges may include conspiracy to commit fraud, wire fraud, extortion, money laundering or a combination of the aforementioned charges, further exacerbating the challenges around collecting conclusive incident data. Although there are obvious challenges related to gathering accurate statistics and incident data relating to virtual kidnapping, a number of alternative methodologies for accessing and processing information may assist in this regard. Anecdotal evidence, unofficial data, and prosecuted cases are good indications of the scale of the threat and have served to posture the position that the trend has and will continue to grow.

Growing Trend

The scam, once confined to Mexico and Southwestern border states in the US, has seemingly spread to the rest of the US in recent years, representing a significant shift in the trend. Investigators in the FBI’s Los Angeles Division tracked numerous virtual kidnapping calls between 2013 and 2015, most of which originated from Mexico, specifically Mexican prisons, and targeted Spanish speaking individuals or immigrant workers within the US, particularly in Los Angeles and Houston. After 2015, trends shifted and criminals targeted victims indiscriminately and far more frequently using the cold-calling method – a tactic which increased the number of victims significantly. Since 2013, the majority of the cases probed by FBI in Mexico have emanated from Tamaulipas and Baja California. Further highlighting this trend, the FBI discovered a virtual kidnapping ring based in Tijuana, Baja California targeting the Mexican immigrant population in Washington DC in 2013. The ring placed in excess of 5,000 phone calls a day, a scheme based solely on volume and the odds of success. The ransom payments were primarily sent to San Diego, California and smuggled across the border. The FBI estimate the group made at least USD 500,000 over an unspecified period of time, further illustrating the nature of the threat.

In Mexico, the poor security environment and pervasive threat of crime and traditional kidnap-for-ransom, has enabled the virtual kidnapping trend to grow amid the insecurity. Potential victims in the US are more likely to take the virtual kidnapping threat seriously and engage the extortionist, as a result of the existing threat of traditional kidnap-for-ransom in Mexico. The National Autonomous University of Mexico (UNAM) reported that between 6,000 and 8,000 virtual kidnappings and phone extortion schemes were reported in Mexico in 2017, further highlighting the scale of the threat.

Risk Mitigation

Indicators that you may be the victim of a virtual kidnapping scheme:

  • Callers may attempt to keep you on the phone to prevent you from contacting the victim. Alternatively, callers may threaten you or the supposed hostage in an attempt to discourage you from contacting the victim or the authorities.
  • Callers may convey a sense of great urgency or calls may seem rushed.
  • Calls will not be made from the victim’s phone.
  • Ransom money is only accepted via wire transfer or drop-points.
  • Ransom amount demands may suddenly drop.
  • Incoming calls may come from an outside or international area code.

For risk mitigation, the following should be considered:

  • Be cautious about detailing your whereabouts on social media if you are undertaking travel abroad. Consider updating your social media accounts following your intended trip. Some criminals may research their targets this way.
  • Inform your relatives and close confidants if you will be undertaking travel to areas with no/limited cell phone reception or internet connection.
  • Stay informed about cybersecurity and how to avoid online threats.
  • If you suspect a real kidnapping is taking place, or you believe the call may be a scam, contact your nearest local law enforcement agency as soon as possible.

For further guidance on risk mitigation, iJET clients are eligible for additional information.

Download our 2018 Global Forecast Executive Summaryto get insights into other risks impacting the world today.

]]>
https://pre.hospitalitylawyer.com/virtual-kidnapping-in-the-us-and-mexico/feed/ 0
Travel Safety: Use of Vehicles as Weapons https://pre.hospitalitylawyer.com/travel-safety-use-of-vehicles-as-weapons/?utm_source=rss&utm_medium=rss&utm_campaign=travel-safety-use-of-vehicles-as-weapons https://pre.hospitalitylawyer.com/travel-safety-use-of-vehicles-as-weapons/#respond Fri, 08 Sep 2017 01:32:54 +0000 http://pre.hospitalitylawyer.com/?p=14774 It’s happened again-this time in Barcelona, on the popular tourist and historic street known as Las Ramblas.  A man using a van as a weapon careened down one of the two narrow side streets that border the wide pedestrian path and used it as a missile of sorts, killing 14 innocent people and injuring up to 100 others.  According to Spanish press reports, individuals from 35 nations are among the dead and injured.  Yet again, Europe becomes the scene of terrorist carnage.  Despite the sophistication of Spanish police and intel services, accusations of an intelligence failure on the part of government agencies are already swirling about.

Political wrangling will inevitably take place, but hopefully some effective measures will be adopted to at least deter future would-be terrorists from using their vehicles to mow down civilians.  In the interim, what can we do in the hospitality sector to reduce the threat that our colleagues travelling on business or our assigned personnel in higher-risk locations face?  The random nature of a vehicle-borne attack and the unpredictability of it are at the heart of the issue, but some measures in fact can be taken to lessen our risk.

First and foremost, keep informed of the security environment in the country or region you are visiting.  Do this through a regular review of related material in newspapers and magazines.  In addition, the US State Department, UK Foreign Office and other government websites routinely publish country security status updates that are specifically designed to aid the public in travel planning and safety.  If a respected government agency recommends that the public defer all but essential travel, then it might be wise to heed that recommendation.  That may be an extreme measure, but remember that governments acquire and assess intelligence from a wide variety of sources and boil it down into useful analysis.  We must take such analysis seriously, even if we may never be privy to the source(s) of the intelligence.

Secondly, if you are in a foreign country, it’s wise to place a call to your country’s embassy or consulate for the latest information on the security situation.  In rapidly developing circumstances, embassies may be in possession of updated intelligence furnished by the host government.  This vital information may not have been previously disseminated and can serve as the basis for more informed decision-making in an evolving situation.

Naturally, the most iconic locations draw the most attention from those intent on perpetrating a mass casualty attack.  The Champs Elysees, London Bridge, Times Square, Las Ramblas and other landmarks-such as the World Trade Center-all come to mind.  But avoiding these areas does not mean a visitor or resident will remain safe.  Terrorists planning an attack often have a plan B:  If the primary target becomes too difficult to strike, they will find another, “softer” target to hit.  So, we’re talking about reducing-but not eliminating-risk.  Keep your wits about you, plan alternate routes and ensure to identify possible safe havens, both in areas you may visit and in and around your hotel or workplace.

The fact remains that not much can be done to stop an individual hell-bent on wreaking havoc through the use of a vehicle.  Let’s summarize for a moment the most salient vehicle-borne attacks in Europe and the US:

July 14, 2016 – 31-year-old French citizen Mohamed Lahouaiej Bouhlel used a rented truck to barrel down a pedestrian street in Nice, France on Bastille Day and killed 87 people.  This attack proved to be the most deadly, not only because of the size and weight of the truck, but also due to the fact that the front end had been modified and fitted with a heavy metal plate, designed specifically to maximize its destructive impact.

November 28, 2016 – A student at Ohio State University inspired by ISIS propaganda drove his car into several pedestrians at the school before crashing it and jumping out to continue assaulting victims with a knife. At least 13 people were injured in the attack. The attacker was shot dead by police.

December 19, 2016 – A hijacked truck is driven through a Christmas market in Berlin, killing 12 people and injuring 56 others. The perpetrator was later killed in a shootout with police.

March 22, 2017 – A British man barrels into pedestrians on Westminster Bridge and Bridge Street in London, killing four and injuring more than 50 others. The attacker then crashed the car into a fence at the Palace of Westminster and fatally stabbed a police officer before being shot to death.

June, 2017– Eleven people were injured when Darren Osborne, a self-radicalized anti-Muslim extremist, drove a rented van into a crowd of worshippers leaving London’s Finsbury Park Mosque as Muslims finished Ramadan evening prayers.

Also in June, 2017– Three radicalized British residents of North African descent drove into pedestrians on London Bridge before launching a knife attack in Borough Market, killing 8 and wounding another 48.

August, 2017– A neo-Nazi white supremacist, identified as James Alex Fields, Jr. is alleged to have driven his vehicle into a crowd of demonstrators who were protesting a white supremacist march in Charlottesville, Virginia.  One woman was killed and several people were injured.

Preventing this type of attack is a difficult task for law enforcement inasmuch as it is a low-tech, easy and efficient way to cause mass casualties.  Significantly, the on-line AQAP magazine Inspire urged its followers to use vehicles as weapons and to turn commonly-used items, such as household cleaning agents, or chemicals, into improvised explosive devices.  The low-tech nature of the operation is crucial to its success.  The fewer people involved in an operation and the reduced need to carry out long and complex logistics in preparation for the attack lessen the risk of its detection.  In the case of this Spanish ISIS cell which perpetrated Thursday’s attack, there were at least eight people involved who conspired to commit an even more spectacular attack using large improvised explosive devices.   Their preferred method involved readily available portable gas tanks, widely used in Spain for cooking and home heating.  Nothing noteworthy or suspicious in their acquisition and no special permit is required.

Of course, the use of a vehicle as a weapon and the targeting of a tourist area present a quandary that is not easily addressed.  Law enforcement can deploy additional stanchions and other physical barriers leading up to pedestrian walkways or popular attractions.  Authorities can also strategically-and on the spur of the moment-deploy spike strips to slow down a vehicle and render it immobile in a matter of seconds.  However, the crucial intelligence indicating when and where such an attack will occur would still be lacking.  Even with a sophisticated human intelligence component in its investigative arsenal, the ubiquitous nature of vehicles and the spontaneity with which they can be used as weapons would leave law enforcement ill-equipped to detect almost all of them in the planning stages.  No easy solution for this one.

]]>
https://pre.hospitalitylawyer.com/travel-safety-use-of-vehicles-as-weapons/feed/ 0
Can An Airline Bump You From A Flight? https://pre.hospitalitylawyer.com/can-an-airline-bump-you-from-a-flight/?utm_source=rss&utm_medium=rss&utm_campaign=can-an-airline-bump-you-from-a-flight https://pre.hospitalitylawyer.com/can-an-airline-bump-you-from-a-flight/#respond Sat, 26 Aug 2017 20:48:08 +0000 http://pre.hospitalitylawyer.com/?p=14753 After a week-long business trip, you board a flight around 3:00 pm. As you settle into your seat and prepare for the flight a representative from the airline comes up to you and politely breaks the news that you’ve been selected to be bumped from the plane. You  argue briefly, but without making a huge scene you secure your items and exit the plane.

Why were you the one chosen to de-board the plane?  What should you do next?

Airlines consistently overbook flights. They do not do this to bump people off of flights, but to ensure that all seats on the flight are purchased and filled. Airlines overbook flights because some passengers cancel their flight last minute, do not show up for their flight, miss their connection or show up too late to the airport. Additionally, people can be bumped from flights because of weight restrictions due to weather and cargo or if the airline switches from a larger aircraft to a smaller one.

Although it is not rare for airlines to overbook flights, it is rare that a person becomes involuntarily bumped from a flight. U.S. Department of Transportation statistics show that fewer than one out of 10,000 people are bumped from flights involuntarily. There is a difference between voluntary and involuntary bumping from a flight. Both options have their perks and disadvantages. Typically, prior to someone being involuntarily bumped from a flight, flight attendants will request for someone to voluntarily give up their seat. If no one volunteers they will proceed to involuntary bumping.

What to do when you’ve been involuntarily bumped from a flight:

You can be involuntarily bumped from a flight. This occurs when no one voluntarily gives up their seat on the plane. Contrary to the example in the beginning, airlines will rarely bump you from a plane once you have already boarded. Most airlines would bump you prior to the boarding process. However, once bumped the airline must give a written document to you, the involuntarily bumped passenger, regarding your rights. This document also contains reasons as to why you were bumped and why others were not.

The main reason passengers are bumped from a flight rather than others is based on check-in time and time the passenger arrived at the gate. One way to prevent this from happening is to check in to the flight prior to leaving for the airport, ideally check in the night before. If you do not arrive to the gate 15-30 minutes prior to the flight most airlines forfeit your reservation. You should especially arrive early to flights in busy airports or when flying to popular destinations. The last passengers to check in to a flight are typically the first to be bumped.

According to the Department of Transportation, if you are bumped from a flight you are often entitled to compensation in the form of cash or check. The amount paid to the passenger depends on the length of their delay and the original ticket cost. Here are the guidelines from the Department of Transportation to follow if bumped from a flight involuntarily:

  • “If you are bumped involuntarily and the airline arranges substitute transportation that is scheduled to get you to your final destination (including later connections) within one hour of your original scheduled arrival time, there is no compensation.”
  • “If the airline arranges substitute transportation that is scheduled to arrive at your destination between one and two hours after your original arrival time (between one and four hours on international flights), the airline must pay you an amount equal to 200% of your one-way fare to your final destination that day, with a $675 maximum.”
  • “If the substitute transportation is scheduled to get you to your destination more than two hours later (four hours internationally), or if the airline does not make any substitute travel arrangements for you, the compensation doubles (400% of your one-way fare, $1350 maximum).”
  • “If your ticket does not show a fare (for example, a frequent-flyer award ticket or a ticket issued by a consolidator), your denied boarding compensation is based on the lowest cash, check or credit card payment charged for a ticket in the same class of service (e.g., coach, first class) on that flight.”
  • “You always get to keep your original ticket and use it on another flight. If you choose to make your own arrangements, you can request an “involuntary refund” for the ticket for the flight you were bumped from. The denied boarding compensation is essentially a payment for your inconvenience.”
  • “If you paid for optional services on your original flight (e.g., seat selection, checked baggage) and you did not receive those services on your substitute flight or were required to pay a second time, the airline that bumped you must refund those payments to you.”

Once you cash the check from the airline, you can no longer negotiate or request more money. If you do not think that the amount paid to you is fair, prior to cashing the check, you can take the airline to court and try to make more money. Furthermore, according to the Code of Federal Regulation, “No person may assault, threaten, intimidate, or interfere with a crewmember in the performance of the crewmember’s duties aboard an aircraft being operated.” Like the example in the beginning if you would have made a scene you could have been charged with a hefty fine.

International flights flying in to the U.S. do not have to abide by these rules, however most do voluntarily. Overall, Europe has similar rules to the United States. Europe calls for volunteers for compensation first. If no one comes they will proceed to bump someone from the flight. They give first priority to those with reduced mobility and any passengers accompanying them. According to Eur-Lex the rules of denied boarding in Europe are as follows:

  • “Reimbursement of the cost of the ticket within seven days or a return flight to the first point of departure or re-routing to their final destination;”
  • “Care (refreshments, meals, hotel accommodation, transport between the airport and place of accommodation, two free telephone calls, telex or fax messages, or e-mails);”
  • “Compensation totaling:
    • €250 for all flights of 1,500 kilometers or less;
    • €400 for all intra-EU flights of more than 1,500 kilometers, and for all other flights between 1,500 and 3,500 kilometers;
    • €600 for all other flights.”

What happens when you volunteer to be bumped from a flight?

On the contrary, if you have the time to be bumped from a flight voluntarily it may pay out generously. The longer you wait before boarding the flight, the more vouchers and or money the airline will most likely give you. The amount not only depends on the urgency of finding a volunteer, but also the length of delay from your future destination. Some questions to consider asking before accepting the airline’s offer:

  • Can I get cash rather than a flight voucher?
  • If not cash, can I get a gift card that can be used on another flight?
  • If I cannot get cash or gift card, are there restrictions or blackouts as to when I can use my voucher?
  • Do I have a guaranteed ticket for my next flight, or am I on standby?

Additionally, do not be afraid to ask for one or more of the following:

  • Meal vouchers.
  • Seat upgrade to business class, or first class.
  • Admission to the airport club while you wait for your next flight.

Final tips to avoid being bumped:

  • Check-in to flight 24 hours in advance.
  • Establish status with airline by flying same airline or their alliance partner each flight.
  • Reserve seat assignment when flight is booked.
  • Arrive to the gate at least 30-45 minutes prior to the flight.

This article was originally published by Travel & Transport. Click here to read the original article.

]]>
https://pre.hospitalitylawyer.com/can-an-airline-bump-you-from-a-flight/feed/ 0
How to Minimize Jet Lag Symptoms https://pre.hospitalitylawyer.com/how-to-minimize-jet-lag-symptoms/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-minimize-jet-lag-symptoms https://pre.hospitalitylawyer.com/how-to-minimize-jet-lag-symptoms/#respond Sat, 29 Jul 2017 19:04:32 +0000 http://pre.hospitalitylawyer.com/?p=14509 Circadian rhythm disruption occurs when the rhythm set by one’s biological clock is misaligned with the solar day and night cycle of the environment. One of the most acute disruptions to circadian rhythm is rapid travel across time zones – a phenomenon known as jet lag. Jet lag not only impacts individual travelers but can also affect a company’s bottom line. In fact, a recent study found that mistakes made by jet lagged staff members cost UK businesses more than EUR 240 million (USD 311 million) during 2016.

To minimize the symptoms of jet lag, travelers need to recognize that their internal clock and circadian rhythm are dependent on environmental cues, such as light. Travelers who are unaware of this often use ineffective and even harmful means to minimize the symptoms of jet lag, such as alcohol and excess amounts of caffeine. Even though there is no single treatment to combat jet lag or its effects, scientists have developed useful recommendations and guidelines to help minimize its symptoms. This blog post attempts to present simplified, best practice information, while acknowledging that a host of other information – which some may find confusing or complex – exists on the Internet.

General Guidelines for How to Minimize Jet Lag

The first question you should ask when considering what steps to take to minimize jet lag is this: How many days will I be traveling? This simple metric is useful to determine whether or not you should shift and adapt your biological clock to a destination’s local solar time. These guidelines are primarily based on a 2009 article published in Sleep Medicine Reviews – a peer-reviewed medical journal.

Traveling for 1-2 Days

When you plan to be in a destination for only one to two days, there really is no point in helping your circadian rhythm adapt to the destination time zone – by the time you become adapted to this time zone, you will arrive back at home. The general advice for this scenario is:

  • Sleep when you can.
  • Maintain alertness by using stimulants, such as caffeine.
  • Schedule important meetings when you will have a higher propensity to stay awake; be aware that your circadian rhythm will be off, and therefore, your performance could be askew, as well.

Traveling for More Than 4-5 Days

Pre-flight preparation is necessary when you plan to be in a destination for more than four to five days, especially if it is critical that you be able to work immediately upon arrival. The primary goal of the guidelines presented below is to help shift your internal clock in the correct direction to help minimize the effects of jet lag.

These guidelines should be followed starting prior to departure and continuing for three to four days after arrival. It is extremely important to note that both light and melatonin (0.5 mg pre-flight and 3-5 mg post-flight) are used together in this protocol. Furthermore, all times are noted relative to departure location time, because that is the time your biological clock is synchronized to prior to the protocol.

How to minimize jet lag going west

When you travel westward, you are actually traveling back in time compared to the 24-hour rotation of the earth. Therefore, your internal clock needs to shift back in time to remain in sync with the 24-hour rotation of the earth.

  • Avoid Bright Light during the Morning: Since light exposure in the early morning causes the internal clock to shift forward, avoid bright light during the departure location’s early morning.
  • Seek Bright Light during the Evening: Since light exposure in the late evening shifts the internal clock back in time, seek bright light during the departure location’s late evening.
  • Take Melatonin during the Early Morning: Melatonin should be taken during the departure location’s early morning (0.5 mg pre-flight and 3-5 mg post-flight).

How to minimize jet lag going east

When you travel eastward, you are actually traveling forward in time compared to the 24-hour rotation of the earth. Therefore, your internal clock needs to shift forward in time to remain in sync with the 24-hour rotation of the earth.

  • Seek Bright Light during the Morning: Since light exposure early in the morning causes your internal clock to shift forward, seek bright light during the departure location’s early morning.
  • Avoid Bright Light during the Evening: Since light exposure late in the evening shifts your internal clock back in time, avoid bright light during the departure location’s late evening.
  • Take Melatonin during the Early Evening: Melatonin should be taken during the departure location’s very early evening (0.5 mg pre-flight and 3-5 mg post-flight).

What About Traveling for 3-5 Days?

The same strategies used for “Traveling More Than 4-5 Days” can be used for trips that last three to five daysto achieve partial adaptation to the new time zone, if you want to create a more favorable sleep schedule. However, it is important to note that even though adapting to solar time of the new destination is optimal, it may be very difficult to achieve in this situation because of the intermediate length of such trips.

A Few More Words on Melatonin and Light

Melatonin is not readily available in most countries. In the US, melatonin can be found over-the-counter. However, since melatonin is considered a nutritional supplement, it is not regulated by the FDA. According to the National Academy of Science, short-term use of melatonin at a daily dose less than or equal to 10 mg is safe in healthy adults who are not taking other dietary supplements or concurrent medications. The American College of Physicians recommends that melatonin be avoided by people who have asthma and people who plan to drive or operate heavy machinery within eight hours of taking it. All travelers should consult with their healthcare provider before using melatonin.

Strategies to avoid light include wearing protective eyewear, sleeping, and staying in a darkened room. Whenever possible, individuals attempting to avoid light should also avoid using electronic devices such as computers, smartphones, or televisions. Strategies to expose oneself to light include going outdoors during daylight, using special room lighting, or using a commercial light box. People taking photosensitizing agents, such as malaria medications and certain antibiotics, should use caution when using a commercial light box.

Conclusion

Jet lag is observed when a traveler arrives in a new time zone that differs widely from his or her home time zone. Because this new time zone has a different solar time, the traveler’s internal clock is not synchronized with it. Symptoms of jet lag persist until the internal clock shifts and synchronizes with the solar time in the new time zone; the ability of the internal clock to synchronize with a new solar time varies from individual to individual. Guidelines, advice, and even apps regarding the management and prevention of jet lag are readily available; however, it is easy to become overwhelmed in this sea of possibly conflicting information. The information in this blog post highlights practical, cohesive strategies that can be used to help you combat jet lag.

]]>
https://pre.hospitalitylawyer.com/how-to-minimize-jet-lag-symptoms/feed/ 0
OTA & Travel Distribution Updates – June 23rd, 2017 https://pre.hospitalitylawyer.com/ota-travel-distribution-updates-june-23rd-2017/?utm_source=rss&utm_medium=rss&utm_campaign=ota-travel-distribution-updates-june-23rd-2017 https://pre.hospitalitylawyer.com/ota-travel-distribution-updates-june-23rd-2017/#respond Wed, 05 Jul 2017 04:29:32 +0000 http://pre.hospitalitylawyer.com/?p=14449 “OTA & Travel Distribution Updates” is posted weekly by Duff on Hospitality Law, which is run by Greg Duff of Garvey Schubert Barer. Originally begun as an exclusive update to clients, these pieces are now publicly distributed a week behind the exclusive update. Although these posts are a week or two behind the initial update, we believe that the information can be relevant and useful to the digital marketing / e-commerce / distribution world.

This week’s GSB OTA & Travel Distribution Update for the week ending June 23, 2017 is below.  A variety of stories this week.

Time to Take French Legislative Prohibitions Seriously [OTA/PARITY]
(“Expedia fined in France over hotel price parity clauses”, Mlex, June 23, 2017)
Expedia learned first-hand this past week that France’s Loi Macron legislation is indeed the “law of the land” – at least for now. Last week, a French Court of Appeals ruled that Expedia’s rate parity provisions violated the legislation’s ban on rate parity and fined Expedia one million euros. Recall that France was one of three EU countries whose competition authorities agreed in 2015 to Booking.com’s proposed “narrow” (direct channel only) approach to rate parity, but then soon thereafter passed legislation banning rate parity altogether. Many have questioned the effect of the French legislation given the inconsistent prior administrative resolution. For now, we have a sense as to how French courts might view rate parity.

Airbnb Rolls Out Hotel-Like Services [SHORT-TERM RENTALS]
(“Airbnb is reportedly creating a fancier service for people who prefer hotels,” Bloomberg, June 23, 2017)
In a move targeting more traditional, higher-paying (historically, non-Airbnb) hotel guests, Airbnb quietly launched this past week a beta test of its new “select” program for hosts that satisfy a pre-determined set of quality standards (e.g. matching bed linens, lush towels and single use toiletries). Hosts who are invited to be part of this distinct program will be subject to physical inspections by Airbnb representatives. Those passing the inspection can expect preferred and distinct placement on the Airbnb website and a variety of “preferred perks” – use of a professional photographer, interior decorator, contracted “hotel like” cleaning services, etc. According to a report last week in Seattle’s weekly business publication, Puget Sound Business Journal, Seattle has been identified as a test market for this new “select” program and a well-known local cleaning service has been retained by Airbnb to clean hosts’ homes and apartments.

Adequacy of OTA Disclosures Questioned Again [OTA]
(“Frustrated United customers say they didn’t realize they were purchasing ‘basic economy’ tickets (UAL, EXPE, PCLN), Business Insider, June 21, 2017)
Those of you who have been frustrated by OTAs’ general reluctance to conspicuously post certain disclosures, disclaimers or other important information (e.g. resort fees or other mandatory charges, tax inclusive rates, etc.) prior to booking will appreciate the challenges that United Airlines is apparently now experiencing with OTAs and the adequacy (or inadequacy) of disclosures around United’s basic economy fairs. An interesting read.

——-

Other news:

Airbnb Is Testing a Feature That Would Let You Split the Cost With Friends
Fortune Magazine, June 23, 2017
One less hassle?

TRVL is the best travel platform you’re not using (yet)
The Next Web, June 23, 2017
From the moment I saw it, I was instantly enamored with TRVL. The brainchild of Dutch entrepreneur Jochem Wijnands, TRVL is a sort of mashup that turns each user into a travel agent with the potential to earn money for their recommendations. Think of it as TripAdvisor meets Airbnb and Skyscanner.

]]>
https://pre.hospitalitylawyer.com/ota-travel-distribution-updates-june-23rd-2017/feed/ 0
Simple Tips to Speed your Way and Enhance your Security https://pre.hospitalitylawyer.com/simple-tips-to-speed-your-way-and-enhance-your-security/?utm_source=rss&utm_medium=rss&utm_campaign=simple-tips-to-speed-your-way-and-enhance-your-security https://pre.hospitalitylawyer.com/simple-tips-to-speed-your-way-and-enhance-your-security/#respond Tue, 20 Dec 2016 16:54:12 +0000 http://pre.hospitalitylawyer.com/?p=14288 The end of year holiday period is full of cheer, family and friends and at times, travel.  But ask any experienced traveller and you will hear in short order that it is one of the most stressful periods in the year for air travel.  Long lines, surly airline employees and at times inconsiderate fellow passengers can try your patience.  To help make your journey easier and safer, we’ve compiled a list of a few things you can do to speed your way through the airport and onto your flight.  In addition to these simple tips, we’ve also listed some key security issues that you should be aware of and allot extra time or take preventive measures as needed.

With regard to getting through the airport quickly and ensuring you make your flight, take note of these tried and true tips:

  •       Ensure to comply with the restrictions on liquids/creams in carry-on luggage.  You don’t want to have prohibited items confiscated at the security checkpoint.  Check with the TSA website (www.TSA.gov) for guidance on carry on rules.
  • Wear slip-on shoes to the airport if possible to make removal of shoes easier.  They take less time to put on as well.
  • Avoid carrying your wallet in a rear pocket-airports are still attractive targets for thieves posing as passengers.  That simple bump into another person may have been a deliberate attempt to extract money or other valuables from your pockets or purse.
  • Have your government-issued, photo ID handy at all times.  Don’t fumble in the airport repeatedly by having to retrieve it from your wallet or purse-a thief can key on that and target you while you are distracted and searching for the document.  The best place for a driver’s license or passport when travelling by air is in a front pocket.  A potential thief is unlikely to try and reach into this pocket.
  • Take a list of all medications and their dosage as well as the phone number for your pharmacy and that of the prescribing doctor.  This makes getting an emergency supply easier and quicker.  If you are out of your home country, consult your embassy’s website for guidance on medical care in country.
  • Finally, remember to never make jokes or even off-handed remarks about security issues to airline or airport employees.  Each and every threat or perceived threat must be taken seriously and investigated until authorities are certain that there is no risk.  This could cause you to miss your flight, be banned from flying or worse yet, be taken into custody.  If you are #flyingwhilemuslim you may want to avoid speaking Arabic or reciting prayers during flight or pre-flight.  Arabic speaking males have been removed from flight in the US and UK on many occasions post 09/11 as suspicion of Muslims and those perceived as Muslim has reached fever pitch.  With the election of Donald Trump as president in the US, harassment of Muslims or those perceived to be Muslim has worsened, according to statistics.

Threats to Aviation:

Air travel continues to be an attractive target for terrorists but in recent years, airport facilities or other travel infrastructure have figured more prominently since the actual aircraft have been hardened.  This year’s attacks in major airports such as Istanbul and Brussels have made this abundantly clear.  Passengers and employees were gunned down while waiting in areas accessible to the public, such as the luggage carousel and the check-in line.  Furthermore, the November 2015 attacks in Paris included multiple targets, from bars and restaurants to sports venues and a concert hall.

Bottom line is although we cannot take our eyes off aviation and the devastating effects an attack could have on a civilian aircraft, other targets perceived as vulnerable, so called “soft targets”, have been hit with more frequency in the last several years.  We note that an exception to this trend was the apparent successful downing by explosive device of a flight by Russian airline Metrojet at its initial cruising altitude en route from Sharm el Sheik, Egypt to St. Petersburg in Russia.  The presumed attack occurred in October of 2015.  Although Russian and Egyptian authorities play down this prospect in favor of a mid-air structural break-up, forensic examination conducted on the aircraft’s remains shows the telltale signs of pitting on the metal skin of the plane emanating from the interior.

Bear in mind that aviation is an extremely safe and reliable form of transportation and although it is not without risk, you are much more likely to be injured or killed in a car accident or even on a commuter train.  Don’t drink and drive.  Do not use recreational drugs and drive and ensure your prescription medication will not impair your ability to drive safely.  TSA provides up to date travel safety and security information.  US and foreign government websites also provide information about conditions on the ground in a number of foreign countries.  The US Department of State (www.state.gov) and the British Foreign Office (http://www.gov.uk/foreign-travel-advice) have comprehensive travel advisory websites which are updated frequently.

Like this article?  Send us your thoughts to info@securitystrategiestoday.com  and follow us on Twitter @securitystrateg

]]>
https://pre.hospitalitylawyer.com/simple-tips-to-speed-your-way-and-enhance-your-security/feed/ 0
The Zika Virus – How Is It Impacting the Meetings and Travel Industry https://pre.hospitalitylawyer.com/the-zika-virus-how-is-it-impacting-the-meetings-and-travel-industry/?utm_source=rss&utm_medium=rss&utm_campaign=the-zika-virus-how-is-it-impacting-the-meetings-and-travel-industry https://pre.hospitalitylawyer.com/the-zika-virus-how-is-it-impacting-the-meetings-and-travel-industry/#respond Tue, 03 May 2016 00:56:49 +0000 http://pre.hospitalitylawyer.com/?p=14040 Chances are if you’ve been on the internet or watched more than five minutes of TV, you’ve heard of the Zika virus. But how is it “impacting the meetings and travel industry?”

With the continuing spread of the zika virus, “more than one-third of respondents had moved or canceled meeting that were scheduled to take place in high-impact areas” and many others are taking increased precaution. Additionally, attendee attendance in these sensitive areas has decreased. Helms Briscoe has laid out a “compilation of the most up-to-date information” put together by the U.S Travel Association.

Click here to read the full article.

]]>
https://pre.hospitalitylawyer.com/the-zika-virus-how-is-it-impacting-the-meetings-and-travel-industry/feed/ 0
Detecting and Neutralizing Terrorist Plots in Europe Requires Greater Integration of Intel and Police Agencies https://pre.hospitalitylawyer.com/detecting-and-neutralizing-terrorist-plots-in-europe-requires-greater-integration-of-intel-and-police-agencies/?utm_source=rss&utm_medium=rss&utm_campaign=detecting-and-neutralizing-terrorist-plots-in-europe-requires-greater-integration-of-intel-and-police-agencies https://pre.hospitalitylawyer.com/detecting-and-neutralizing-terrorist-plots-in-europe-requires-greater-integration-of-intel-and-police-agencies/#respond Fri, 15 Apr 2016 22:48:49 +0000 http://pre.hospitalitylawyer.com/?p=14020 Europe suffered yet another horrific terrorist attack last month, this time in Belgium.  ISIS-inspired, radicalized, young European men placed multiple explosive devices in a departure terminal of the Zaventem International Airport in Brussels, causing massive loss of life.  They simultaneuosly blew up a commuter rail car packed with passengers.  The attacks, coordinated among disenfranchised Belgian citizens of North African origin, come on the heels of the devastating Paris attacks last November, which claimed the life of 130 people.

The initial investigative findings revealed not only kinship between the Paris and Brussels attackers, but operational links.  Specifically, Salah Abdeslam, believed to be the only surviving member of the group that perpetrated the Paris attacks, was located and taken into custody only days before four bombers carried out the coordinated attacks in Brussels.  Convinced that Abdeslam’s arrest would expose a follow-on plot being planned in Paris, the Brussels subjects switched gear, altered their tactics and opted to inflict mayhem on the EU capital, according to investigators.

Mohamed Abrini, identified as the man in the cap and grey jacket in the Brussels airport CCTV frame captured just before the blast, has admitted that he played a role in the attacks and that he fled after his bomb failed to detontate.  Also, his DNA and fingerprints were lifted from the Renault Clio used in the Paris bombings.  He and Abdeslam were observed on video at a mini mart fleeing the French capital the night of the attacks, November 13, 2015.

unnamed

French national police BOLO for subject Abdeslam Salah

With major investigations spanning several European countries, it is worth taking a look at EU history and evolution.  The EU has gone from a loosely-affiliated trading block at its inception in the years following World War II to an integrated, social, diplomatic, defense and legal entity.  The euro is one of the world’s reserve currencies. The block’s navies patrol the Mediterranean in joint operations and air traffic and safety are regulated by EASA, the European Aviation Safety Agency.  It has a common agricultural policy and trade negotiations and tariff agreements are negotiated for the entire block through the European Commission, the executive branch.  Free movement of goods, services and people is guaranteed within the Schengen area of the continent, which includes most EU countries, plus Switzerland and Norway.  In real terms, there is significant integration and national sovereignty has been largely ceded to Brussels in some areas, such as in anti-trust and intellectual property matters.

But harmonization of laws and integration have their limits.  The block’s “common defense” initiatives play second fiddle to NATO and to individual, sovereign deployments, such as the French mission in Mali.  Additionally, some countries, in particular the UK, are loathe to accept less skilled migrants from fellow EU members Bulgaria and Romania and instead have negotiated complex deals with Brussels to stagger their arrival and their ability to obtain work permits.  It is in effect a “second tier” status for some EU citizens.  The permanance and cohesiveness of the block-the idea that Europe must remain unified in order to avoid a repeat of its two devastating 20th century wars-are achieved through institutionalized back and forth negotiation and much give and take among member states.

But in spite of such expansive integration, it turns out that the EU has purposely limited information sharing, especially with non EU members but within the block itself.  This can have devastasting effects on the safety and security of its citizens.  The elimination of cross border checks withn the Schengen area necessitates even greater data and intelligence sharing among authorities.  How can police in France be alerted to the arrival of a fugitive travelling by car from Spain?  How can Italian authorities interdict a large illegal drug shipment being carried by a passenger on an overnight train from Germany?  How can a human trafficking ring be broken up and its victims rescued if only fragmentary intelligence and investigative results are being shared? Why is one immigration policy pursued in Germany and and yet another in Austria?

unnamed (1)

Belgian troops on patrol outside the headquarters of the European Commission in Brussels

The fact is fugitives and traffickers are caught and contraband is detected and intercepted, but with less frequency and efficiency than what one would expect from nations with world class police and intel agencies.  True integration of police services, such as what we see in the United States with the Joint Terrorism Task Force, present in every FBI field office, does not exist.  That (near) seemless, broad-based, daily sharing of current, actionable intel that has helped the JTTFs prevent countless acts of terrrorism since 09/11 exists within the EU in theory only.  Ad hoc task forces and working groups have been successful, especially in organized crime and art theft matters.  In the counterterrorism realm however, the intelligence is often fragmented, stove-piped or subject to an excessive amount of bureaucratic meddling to be truly of value operationally or on a long-term, sustained basis.  Significantly, there is no established, multi national police agency with a unified, operational chain of command that can be deployed at a moment’s notice.

Europe must overcome these hurdles if it is to reduce the liklihood of further terror attacks while maintaining its open society.  A mandate to share rather than to withhold information must be adopted.  A multi-national JTTF with an operational, investigative role and participation from all member states is step one.  Its permanent staffing and funding must not be in dispute.  Europol, little more than a glorified Interpol at this point, could be put to greater use as a fusion center used to integrate, analyze and disseminate intel throughout the block and to feed potential cases to the JTTF for initiation.

The above effort may require the approval of each of the 28 national governments representing EU members.  But there is no real choice-it must be done.  If internal borders are in effect no longer in existence, then a common operating picture and level playing field among EU police agencies must evolve and become a reality.  It will have a distinctive European character and the FBI-inspired JTTF may not be the model evenutally adopted.  It is a model however which has been successful in the US and has broadly increased analytical thinking and force readiness.  Its unique character and composition have enabled investigators nationwide to “connect the dots”.  The lack of resources argument no longer works-all terorrism related intel must be vetted on a priority basis.  A cultural heritage theft case, while important, must take a back seat to a threat against the homeland.

While it is not a magic bullet, it is worth considering.  A European JTTF just might work in Europe too!

Like this article?  Send us your thoughts to info@securitystrategiestoday.com  and follow us on Twitter @securitystrateg

]]>
https://pre.hospitalitylawyer.com/detecting-and-neutralizing-terrorist-plots-in-europe-requires-greater-integration-of-intel-and-police-agencies/feed/ 0
Personal Protective Measures for Today’s Global Citizens https://pre.hospitalitylawyer.com/personal-protective-measures-for-todays-global-citizens/?utm_source=rss&utm_medium=rss&utm_campaign=personal-protective-measures-for-todays-global-citizens https://pre.hospitalitylawyer.com/personal-protective-measures-for-todays-global-citizens/#respond Fri, 08 Apr 2016 21:04:14 +0000 http://pre.hospitalitylawyer.com/?p=13995 Personal protective tips are a necessity for business travelers. From the Post Vietnam War era of kidnapping and ransom scenarios throughout South America to terror attacks against western cultures in Europe and the US, the number and types of threats faced by travelers continues to increase. Unfortunately, what we have yet to see is same level of advancement in mitigation strategies and personal protective measures.

Regardless of the industry, more and more business travelers are being placed in situations where they realize unacceptable levels of risk and personal protection tips can help. Gone is need for the ambiguous security plans of the ‘60s and ‘70s, developed to fuel the egos of corporate executives. Business travelers need protective measures and personal protection tips that are both tangible and effective.

In order to mitigate this rapidly changing risk, security consultants today must have intimate knowledge of the impact each lost asset will have on the client’s business, as well as all of the stressors their clients may face both while traveling at home and abroad. Most importantly, and sadly the most often neglected factor in the risk equation, is the need for effective risk mitigation strategies.

Remain Vigilant is Not a Tangible Tactic for Travelers

All too often we see pundits, media darlings,  self-proclaimed “experts” and even consulting products provide mitigation strategies that are either just general precepts on what to do or tactics that are too ambiguous to be effective. As most of us have recently seen from the attacks in Paris and Brussels, business travelers, expatriates and students studying abroad face legitimate threats, regardless of their destinations.

The duty of care for those responsible for that travel requires that they provide effective and actionable protective measures and not lofty strategic doctrine that has no substance.  But what is that exactly? What does an effective protective measure look like?  Let’s continue on with our Brussels example to find the answer.

Even as the attacks were occurring in Brussels, corporate crisis management teams, newscasters and public officials were broadcasting the need to “be more vigilant” to “raise the level of awareness” and “implement a heightened sense of security,” but failed to let us know what that looks like. What actions do you take or what equipment do you deploy to “be more aware?”

Another point supporting this dynamic shows a summary of information collected on the actions taken by security professionals during the actual attacks.  While most organizations did what they were trained to do, most if not all of those tasks performed would prove to be ineffective in actually mitigating the risk from a violent attack against a traveler.  Let’s look at some details to better realize the difference between strategic guidance and effective protective measures.

Expert Tactics That Can Help Keep You Safe

When we tell someone to be more aware of their surroundings, by definition, we are telling them to be more cognizant or conscious of the people and objects in their environment in hopes of identifying someone or something that has the potential of causing them harm and hopefully avoiding closer contact with that person or object. So we see that by recommending that a person be more aware, we have actually asked them to perform three tasks that include:

  • Identify the physical space that actually constitutes “your operational environment”
  • Determine which objects in that space may cause you harm
  • Determine the people in that space that may cause you harm

This brings us to the point where we realize that the difference between a precept and a tactic is not so much in telling someone what to do, but how to do it.  Let’s continue on with our example of becoming more aware.

While we have simple and effective methodologies for identifying your operational space and potentially hazardous substances or devices, let’s focus on how we identify someone who has the intent to commit an act of violence (or any other crime for that matter).

Keep in mind, we are using this technique to identify those who may potentially cause us harm and not imposing a death sentence.  The point being is that it’s OK to move away from someone you have determined may harm you without harming that person if they are innocent.

The more you practice this, the better and more “aware” you become. While it may initially seem like a lot to do, after one overseas trip of applying this technique, you can perform this analysis in just a few seconds.

The tactic revolves around the acronym FACE:

FACE

  • Focus
  • Attitude and Actions
  • Clothing and Appearance
  • Environment

F = Focus.

What is the focus of the person you are evaluating? People generally focus on the reason they are in a certain situation, like watching a sporting event. They are focused on the field or court, perhaps focused on a colleague with whom they are discussing a play.

Someone there to commit a crime will also be focused on their reason for being there. Searching for a place to plant an explosive, going against the grain, searching for a concentration of people or focused on the weapons they will use to commit their crime.

  • What is the focus of the person you are analyzing?
  • Is it similar to those around you?
  • Is it appropriate for the situation?

A = Attitude and Actions.

In this case, we are trying to determine if the attitude and actions of the person we are assessing are appropriate for the situation. You expect a deliverymen to be anxious or hurried. People waiting in line may be irate or rude.

Someone waiting in line that is mumbling to themselves, fumbling with objects in a pocket or backpack or for whatever reason, their attitude or actions do not seem appropriate, consider this person suspicious.

C = Clothing and Appearance.  

Seeing someone with blue hair and blue paint on their chest would raise suspicion at the White House or the Vatican, but this same person in Kansas City would be considered nothing more than a loyal Royals baseball fan.  Again, we are not looking for someone that you personally feel is odd, but someone whose clothing and appearance are not appropriate for the current situation.

Is this person wearing a heavy coat while the rest of the crowd is in t-shirts and shorts? Are they attempting to portray a certain culture such as a US Cowboy, hip hop star or other cultural group? (Especially in an attempt to mask their true intentions.) Are they sweating profusely, despite cooler temperatures? Heavily perfumed? Do they act or appear to be under the influence of drugs or alcohol?

E = Environment.  

When considering the environment, there are two factors, one is the physical environment such as time of day, weather, geography and seasons and the other is the operational environment. Has an attack already occurred? Are people evacuating an area? What environmental factor is currently impacting the behavior of those around me? These situations will all change the meaning of what is “appropriate” for the current situation.

We see that we can very quickly go from providing moderately helpful precepts, such as “remain vigilant” to specific actions you can take to actually be more aware. As leaders, executives and administrators, the responsibility is now ours to go beyond the basic factors of knowing the risk profile for people we have placed in harm’s way by knowing what we must protect, what we must protect them from and what we have to protect them with. We must also ensure that we understand how these personal protection tips will be used and ensure that they are effective in mitigating the risk to our institution assets.

Written by: EDWARD D. CLARK

Edward D. Clark is a retired Special Forces Officer with both strategic and tactical level experience in developing and implementing critical infrastructure protection programs and armed response capabilities. Edward holds a bachelor’s degree in criminal justice and master’s degree in computer information systems. He served as the security lead for the White House Homeland Security Council on Bio-terrorism and is a nationally sought after trainer and public speaker on conducting vulnerability

]]>
https://pre.hospitalitylawyer.com/personal-protective-measures-for-todays-global-citizens/feed/ 0
Visiting Cuba: Tourists Lining Up to Visit Cuba, but Many Obstacles Remain https://pre.hospitalitylawyer.com/visiting-cuba-tourists-lining-up-to-visit-cuba-but-many-obstacles-remain/?utm_source=rss&utm_medium=rss&utm_campaign=visiting-cuba-tourists-lining-up-to-visit-cuba-but-many-obstacles-remain https://pre.hospitalitylawyer.com/visiting-cuba-tourists-lining-up-to-visit-cuba-but-many-obstacles-remain/#respond Wed, 06 Apr 2016 20:40:01 +0000 http://pre.hospitalitylawyer.com/?p=13985 President Barack Obama’s mid-December 2014 announcement that the US would restore diplomatic relations and ease tensions with the Castro government ignited US travelers’ interest in visiting Cuba. In defiance of a continuing ban on tourism, in the first three months of 2015 more than 50,000 US citizens visited the island—a 36 percent increase from the same period the year before. Returning travelers flooded travel blogs with pictures and stories of Cuba’s unique glamor, crumbling and romantic, and the number of visitors and those interested in visiting Cuba continued to grow. Travel companies and development agencies project that millions of US citizens will visit Cuba in the next decade. However, travelers trying to reach the island in the new few years will find that every step of the trip, from arranging paperwork, flights, and hotels, to staying safe and in contact with people back home is still complicated. Knowing what to expect can help travelers avoid some of the biggest pitfalls.

Getting There: Easier—but Still a Hassle

The first two steps in reaching Cuba are getting the US government to give the ok, and finding a way to travel from the US. Historically, would-be travelers had to convince the US government that their trip fit into one or more of twelve “permitted” categories, which required extensive paperwork and, occasionally, interviews. In the last year, the US government travel permit process has become more flexible, accepting more applicants with less required paperwork. A second round of bureaucratic easing in September 2015 opened the door further, allowing some close family members to accompany visitors on permitted trips.

Recognizing the potential market, travel companies are moving forward with plans to expand their US-Cuba operations. Airline companies are trying to establish regular, direct US-Cuba commercial routes in 2016. In July 2015, Carnival Corp got the thumbs-up from the US government to begin docking ships as early as 2016. A planned ferry line from Miami to Havana promises to eventually turn getting to Cuba into an overnight boat ride.

Hotels: Low Quality and Quantity

Until major multinational hotel companies are able to open facilities in Cuba, travelers will have trouble finding upscale commercial accommodations. At present, the commercial hotels are owned by the Cuban government or run as public-private partnerships between the government and hotel companies. The government also sets the star rating for hotels, meaning that ratings are generous. Discrepancies on travel message boards show that some of the “five-star” hotels suffer from crumbling facilities and inconsistent electricity.

Not only are hotels limited in quality, they are also limited in quantity. According to the Cuban government, as of 2013 the country only had 60,000 hotel rooms, far fewer than needed to meet the demands of the new tourist population. Major hoteliers have been pushing to establish beachfront resorts since the December 2014 announcement, and Marriot, Hilton, and Radisson are hoping to begin building as soon as the legal situation allows. However, the buildings will not be ready for guests for the next few years.

Travelers wanting to avoid the industrial hotel system can find home-stay options, known as casa particulars, but the system is informal and unregulated.

Money Complexities: Paying to Play

Travelers to Cuba will have to navigate the complexity of a duel currency system and complications with using US bank-backed credit cards—at least for the next few months.

Cuba has the peso (CUP) for the small-purchase domestic economy and the “convertible” peso (CUC) for purchases and transfers in the government market, which includes restaurants, hotels, venue tickets, and most other purchases a traveler is likely to make. Since 1994, Cuba has been openly moving toward a single currency, but unifying the convertible peso and the small-purchase peso is complicated, and could destabilize local economies. The government is moving slowly to minimize market disruptions, but there are signs—including efforts to standardize convertible peso pricing and roll out higher-value denominations—that unification could happen in the next year.

Before Obama’s announcement, travelers could not use US bank-backed credit cards in Cuba. Major credit card companies have since lifted their block on Cuba-based transactions, but banks were wary to adjust their policies. In July the Florida-based Stonegate Bank became the first company to establish a foothold in Cuba in 54 years, allowing their customers to use their MasterCard in the country. For travelers who are not Stonegate clients, the discrepancy between bank hesitancy and credit card policies means that travelers will have to contact their specific banks to check what the policy of the minute is before attempting to use credit cards in Havana.

Criminals: Following the Money

Thieves target travelers, and as more and wealthier visitors flood into Havana, criminal groups will likely become increasingly savvy at separating tourists from their wallets, jewelry, and electronics. Low-effort, high-yield crimes like pickpocketing and purse-snatching will follow in the wake of tourist crowds. Thieves are likely to hit travelers most often at outdoor locations like restaurants or shopping districts. In 2015, the US State Department warned travelers of a growing criminal threat, citing a rash of incidents in the historically low-crime areas of the Havana.

Travelers report that criminals have developed a range of exploitative scams to relieve travelers of small sums of money. One of the most well-known ploys is the “puncture” scam: locals pop tires on parked cars and then offer their assistance—for a price. Other scams include adding additional items to restaurant bills, changing between dollars and pesos (the dollar sign is used for both), and taxi drivers insisting that the meter is broken in order to charge travelers more.

To date, there have been few violent crimes affecting foreign travelers. According to UN information, Cuba’s murder rate is the third-lowest in the Western Hemisphere, significantly lower than the US rate. It is likely that some violent crimes go unreported, and the local media do not report most crimes, but the US, UK, and Australian diplomatic services report few incidents affecting travelers. Of the known violent crimes involving foreigners, most have happened when travelers were engaging in illegal behavior, specifically when trying to hire sex workers. Attackers have been armed with knives and small caliber guns.

Civil Unrest: Rare, but US Travelers Should be Especially Careful

The Cuban government is very sensitive to dissent, so protests and demonstrations are extremely rare, but when they do occur, police will intervene quickly and foreigners who are picked up in association with unrest will be in the dangerous position of being accused of fomenting or encouraging unrest. Given the history between the US and Cuba, this is something that travelers will want to avoid.

The Cuban Government: Unwanted Attention

Historically, the government has monitored foreign travelers. Anecdotal reports suggest that the government has become slowly less concerned with visitors, and that incidents of “suspicious” attention have dropped. The US government still warns travelers that their electronics may be seized by the government for no apparent reason, and that travelers should not assume that electronic communications are private.

Natural Disasters: When It Rains, It Pours, and Then It Floods

Cuba is hit periodically by severe storms and hurricanes that bring high winds and flooding, and occasionally severe earthquakes strike the island. The government is usually proactive in evacuating people during bad weather, but roads and buildings are not built to withstand strong seismic activity or severe weather. Some of the rural areas have very limited infrastructure, and if travelers are in the area during a disaster, they could be entirely cut off from rescue.

Communication Issues: “Can you hear me now? No? Now?”

The embargo severely hampered the development of cellular infrastructure in Cuba. In 2012, the country had a 23 percent telephone density, according to the CIA’s World FactBook. To compare, the US has a 100 percent telephone density, and India hovers around 76 percent. Government plans to develop the telephone cable system, but extending service outside of Havana and other urban areas has been hampered by the weak peso, meaning that coverage is spotty at best. But on the good side, Verizon is now providing service in the country, so US Verizon customers can use their phones in Cuba. It is expensive—as of September, almost USD 3 a minute—but prices are likely to improve over the next few years, as telecom companies move into the Cuban market.

Medical Facilities: Some Good, Some….Not-So-Much

Medical facilities in Cuba are not standardized. Some facilities are clean and well-stocked, and some treatment is less expensive than in the US. However, investigative reports have found facilities in the cities and in rural areas with filthy conditions, insufficient beds, and poor care. Ambulance response is also inconsistent in urban areas and extremely limited outside of cities.

As a side note: Since 2010, the Cuban government has required all visitors entering the country to show evidence of travel insurance that includes medical emergency coverage. The first round of new rules from the Treasury and Commerce departments following Obama’s announcement lifted some of the restrictions on insurance companies, which can now provide travelers with coverage while they are in Cuba. However, travel companies arranging individual visits to Cuba are still urging US citizens to get additional coverage before they leave.

For travelers, visiting Cuba could be an ideal destination: history, culture, beautiful beaches, architecture, nightlife—and the opportunity to see history unfolding. But Cuba in the next few years will stay complicated, and travelers operating in the new and raw space will need to get savvy quickly. For young or novice travelers intent on experiencing the new cuba libre, the best defense will be information and preparation: by knowing what to expect travelers can anticipate the bureaucratic loops, the hotel issues, the crime, and the limited support structure in country—and work with more experienced travelers plan how to get to, through, and safely back from Cuba.

Witten by: Erin Mahrer, Senior Intelligence Analysts, XDS at iJET International

]]>
https://pre.hospitalitylawyer.com/visiting-cuba-tourists-lining-up-to-visit-cuba-but-many-obstacles-remain/feed/ 0