SlideShare a Scribd company logo
“If you want total security, go to prison. There you're fed, clothed, given medical
care and so on. The only thing lacking... is freedom.”
Dwight D.Eisenhower
Tips on Mugging/Extortion/Kidnapping
……………………………………………………………
…………………………………………………………
Town Wise Layout of Karachi
According to estimates from the Human Rights
Commission of Pakistan, close to 2,284 people were
killed in violent attacks in Karachi in 2012. Victims
range from civilians to policemen, the paramilitary
Rangers to development workers, journalists to
lawyers.
Behavior Suggestions on Mugging, Extortion and Kidnapping:
• Be unpredictable. Do not settle into a routine. Vary times and routes to and from work or social
engagements.
• Remember, there is safety in numbers. Avoid going out alone. When traveling long distances by
automobile, go in a convoy. Avoid dangerous areas of the city.
• A privately owned car generally offers the best security. Avoid luxury or ostentatious cars. Keep
your automobile in good repair and the gas tank at least half full. Driving in the center lane of a
multiple lane highway makes it difficult for the car to be forced off the road.
• You should immediately change your number if an extortionist calls also refuse to talk and do
not engage in any conversation with him till you are told by the authorities pursuing your case
for you.
• Avoid moving in high risk areas in the city.
• Be aware of what happens in the city by listening to the radio and subscribing to
alerts.
• Don’t use your cell phones enroute as excessive texting or scrolling takes up your
concentration and you lose sense of things and people around you.
• Don’t stop to share at any unusual scene on the road, it may be a set up.
• CPLC has a self claimed success rates of 98.7% while trying out cases of kidnapping,
give them a try, you have your life to lose in return.
• Give the robber what he wants--money or personal items--without hesitation. Your life
is worth more than your cash and jewelry.
• Talk only if you're spoken to. Avoid getting angry and never speak sarcastically.
Words are weapons that can offend and incite. Keep yours in their holster.
A final word of Advice
1. The overwhelming majority of victims have been
targeted in their vehicles on the way to or from work.
2. A large number of people targeted have ignored the
most basic security precautions thus sometimes the
obvious has to be stated again and again.
3. Violent tactics used by culprits are not static. As
precautions prove effective, they change their methods,
so you must change your security settings as well. As we
say that security is an evolving process and should never
ideally stop.
CPLC – An Overview
The following crime statistics for 2012 are based on reporting by the Citizens Police
Liaison Committee (CPLC) and local law enforcement reports; however, many crimes
remain unreported:
2,032 targeted killings (murders associated with political, sectarian or terrorist groups)
1,790 kidnappings for ransom
4,720 vehicle thefts with approximately 42 percent recovered
18,774 motorcycle thefts with approximately 12 percent recovered
23,962 cell phone thefts
Maj ® Usman Farooq
Monarch Security Services (Pvt.) Ltd.
Southern Region
Sweet Dreams

More Related Content

Viewers also liked

MHA Stalking Presentation for Clery Center 25th Anniversary Program
MHA Stalking Presentation for Clery Center 25th Anniversary ProgramMHA Stalking Presentation for Clery Center 25th Anniversary Program
MHA Stalking Presentation for Clery Center 25th Anniversary Program
Margolis Healy
 
Domestic violence
Domestic violence Domestic violence
Domestic violence
albireno
 
Effects of Domestic Violence in Children
Effects of Domestic Violence in ChildrenEffects of Domestic Violence in Children
Effects of Domestic Violence in Children
therapistfinder com
 
The Marsh Report-Terrorism Risk Insurance 2010
The Marsh Report-Terrorism Risk Insurance 2010 The Marsh Report-Terrorism Risk Insurance 2010
The Marsh Report-Terrorism Risk Insurance 2010
Enterprise Security Risk Management
 
Negative emotion and health why do we keep stalking bears, when we only find ...
Negative emotion and health why do we keep stalking bears, when we only find ...Negative emotion and health why do we keep stalking bears, when we only find ...
Negative emotion and health why do we keep stalking bears, when we only find ...
James Coyne
 
e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and Defense
Erik Iker
 
Hotels restaurants security
Hotels restaurants securityHotels restaurants security
Hotels restaurants security
zaffar abbasi
 
Terrorism
TerrorismTerrorism
Terrorism
anam zahidi
 
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Adam Varn
 
Risk factor
Risk factorRisk factor
Risk factor
Amirul Ismail
 
Herd-Level Management Factors and Culling Rates in Québec Dairy Herds (AABP, ...
Herd-Level Management Factors and Culling Rates in Québec Dairy Herds (AABP, ...Herd-Level Management Factors and Culling Rates in Québec Dairy Herds (AABP, ...
Herd-Level Management Factors and Culling Rates in Québec Dairy Herds (AABP, ...
dhaine
 
Risk & Protective Factor Framework: Practical Applications to Problem Gambling
Risk & Protective Factor Framework: Practical Applications to Problem GamblingRisk & Protective Factor Framework: Practical Applications to Problem Gambling
Risk & Protective Factor Framework: Practical Applications to Problem Gambling
Oregon Problem Gambling Services
 
Alpha Phi Alpha Organizational Overview
Alpha Phi Alpha Organizational OverviewAlpha Phi Alpha Organizational Overview
Alpha Phi Alpha Organizational Overview
Alpha Phi Alpha Fraternity, Inc.
 
Terrorism Risk in 2015: Issues and Perspectives
Terrorism Risk in 2015: Issues and PerspectivesTerrorism Risk in 2015: Issues and Perspectives
Terrorism Risk in 2015: Issues and Perspectives
RMS
 
(6) extortion
(6) extortion(6) extortion
(6) extortion
FAROUQ
 
Kidnap and ransom insurance
Kidnap and ransom insuranceKidnap and ransom insurance
Kidnap and ransom insurance
srudee
 
Extortion
Extortion Extortion
Extortion
Snj SNj
 
Stalking
StalkingStalking
Stalking
citinfo
 
Stalking for Links
Stalking for LinksStalking for Links
Stalking for Links
Wil Reynolds
 
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
 

Viewers also liked (20)

MHA Stalking Presentation for Clery Center 25th Anniversary Program
MHA Stalking Presentation for Clery Center 25th Anniversary ProgramMHA Stalking Presentation for Clery Center 25th Anniversary Program
MHA Stalking Presentation for Clery Center 25th Anniversary Program
 
Domestic violence
Domestic violence Domestic violence
Domestic violence
 
Effects of Domestic Violence in Children
Effects of Domestic Violence in ChildrenEffects of Domestic Violence in Children
Effects of Domestic Violence in Children
 
The Marsh Report-Terrorism Risk Insurance 2010
The Marsh Report-Terrorism Risk Insurance 2010 The Marsh Report-Terrorism Risk Insurance 2010
The Marsh Report-Terrorism Risk Insurance 2010
 
Negative emotion and health why do we keep stalking bears, when we only find ...
Negative emotion and health why do we keep stalking bears, when we only find ...Negative emotion and health why do we keep stalking bears, when we only find ...
Negative emotion and health why do we keep stalking bears, when we only find ...
 
e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and Defense
 
Hotels restaurants security
Hotels restaurants securityHotels restaurants security
Hotels restaurants security
 
Terrorism
TerrorismTerrorism
Terrorism
 
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
 
Risk factor
Risk factorRisk factor
Risk factor
 
Herd-Level Management Factors and Culling Rates in Québec Dairy Herds (AABP, ...
Herd-Level Management Factors and Culling Rates in Québec Dairy Herds (AABP, ...Herd-Level Management Factors and Culling Rates in Québec Dairy Herds (AABP, ...
Herd-Level Management Factors and Culling Rates in Québec Dairy Herds (AABP, ...
 
Risk & Protective Factor Framework: Practical Applications to Problem Gambling
Risk & Protective Factor Framework: Practical Applications to Problem GamblingRisk & Protective Factor Framework: Practical Applications to Problem Gambling
Risk & Protective Factor Framework: Practical Applications to Problem Gambling
 
Alpha Phi Alpha Organizational Overview
Alpha Phi Alpha Organizational OverviewAlpha Phi Alpha Organizational Overview
Alpha Phi Alpha Organizational Overview
 
Terrorism Risk in 2015: Issues and Perspectives
Terrorism Risk in 2015: Issues and PerspectivesTerrorism Risk in 2015: Issues and Perspectives
Terrorism Risk in 2015: Issues and Perspectives
 
(6) extortion
(6) extortion(6) extortion
(6) extortion
 
Kidnap and ransom insurance
Kidnap and ransom insuranceKidnap and ransom insurance
Kidnap and ransom insurance
 
Extortion
Extortion Extortion
Extortion
 
Stalking
StalkingStalking
Stalking
 
Stalking for Links
Stalking for LinksStalking for Links
Stalking for Links
 
Ransomware
RansomwareRansomware
Ransomware
 

Similar to Tips on mugging,extortion and kidnapping

"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
Adrian Wright
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom response
Martijn Bakker
 
Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Crime Prevention and Basic Security for Civil Disturbances in the Community &...Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Mary Lyn Enguerra
 
Sir bryan nstp 2
Sir bryan nstp 2Sir bryan nstp 2
Sir bryan nstp 2
Mary Lyn Enguerra
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
JanMichaelFernandez1
 
Garda Campus Watch
Garda Campus Watch Garda Campus Watch
Garda Campus Watch
TU Dublin
 
Personal Security In High Risk Areas
Personal Security In High Risk AreasPersonal Security In High Risk Areas
Personal Security In High Risk Areas
Francisco Mateo, CPP, CFE
 
ANSWER_KEY_LEA_REVIEW.ppt.ppt
ANSWER_KEY_LEA_REVIEW.ppt.pptANSWER_KEY_LEA_REVIEW.ppt.ppt
ANSWER_KEY_LEA_REVIEW.ppt.ppt
RoleenPearlPanal
 
Best practiceguideforplanningaparty (1)
Best practiceguideforplanningaparty (1)Best practiceguideforplanningaparty (1)
Best practiceguideforplanningaparty (1)
Monic Arguello
 
Best practiceguideforplanningaparty
Best practiceguideforplanningapartyBest practiceguideforplanningaparty
Best practiceguideforplanningaparty
Monic Arguello
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
Roger Johnston
 
Developing A Security Mindset
Developing A Security MindsetDeveloping A Security Mindset
Developing A Security Mindset
David Santiago
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilities
Lavanya Priya
 
4 Fire and Life Safety - Risk Management - 4
4 Fire and Life Safety - Risk Management - 44 Fire and Life Safety - Risk Management - 4
4 Fire and Life Safety - Risk Management - 4
SOCUTD
 
Hackers and Harm Reduction / 29c3 / CCC
Hackers and Harm Reduction /  29c3 / CCCHackers and Harm Reduction /  29c3 / CCC
Hackers and Harm Reduction / 29c3 / CCC
violet blue
 
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
Compliatric Where Compliance Happens
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015
Patrick Wheeler
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training f
Samuel I. Michuki
 
Part 1: Safety Abroad (Exchange)
Part 1: Safety Abroad (Exchange)Part 1: Safety Abroad (Exchange)
Part 1: Safety Abroad (Exchange)
stjglobal
 
Few Reasons Why You Need Bodyguard Services
Few Reasons Why You Need Bodyguard ServicesFew Reasons Why You Need Bodyguard Services
Few Reasons Why You Need Bodyguard Services
Eric Gasper
 

Similar to Tips on mugging,extortion and kidnapping (20)

"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
Kidnap for ransom response
Kidnap for ransom responseKidnap for ransom response
Kidnap for ransom response
 
Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Crime Prevention and Basic Security for Civil Disturbances in the Community &...Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Crime Prevention and Basic Security for Civil Disturbances in the Community &...
 
Sir bryan nstp 2
Sir bryan nstp 2Sir bryan nstp 2
Sir bryan nstp 2
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
 
Garda Campus Watch
Garda Campus Watch Garda Campus Watch
Garda Campus Watch
 
Personal Security In High Risk Areas
Personal Security In High Risk AreasPersonal Security In High Risk Areas
Personal Security In High Risk Areas
 
ANSWER_KEY_LEA_REVIEW.ppt.ppt
ANSWER_KEY_LEA_REVIEW.ppt.pptANSWER_KEY_LEA_REVIEW.ppt.ppt
ANSWER_KEY_LEA_REVIEW.ppt.ppt
 
Best practiceguideforplanningaparty (1)
Best practiceguideforplanningaparty (1)Best practiceguideforplanningaparty (1)
Best practiceguideforplanningaparty (1)
 
Best practiceguideforplanningaparty
Best practiceguideforplanningapartyBest practiceguideforplanningaparty
Best practiceguideforplanningaparty
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
Developing A Security Mindset
Developing A Security MindsetDeveloping A Security Mindset
Developing A Security Mindset
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilities
 
4 Fire and Life Safety - Risk Management - 4
4 Fire and Life Safety - Risk Management - 44 Fire and Life Safety - Risk Management - 4
4 Fire and Life Safety - Risk Management - 4
 
Hackers and Harm Reduction / 29c3 / CCC
Hackers and Harm Reduction /  29c3 / CCCHackers and Harm Reduction /  29c3 / CCC
Hackers and Harm Reduction / 29c3 / CCC
 
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training f
 
Part 1: Safety Abroad (Exchange)
Part 1: Safety Abroad (Exchange)Part 1: Safety Abroad (Exchange)
Part 1: Safety Abroad (Exchange)
 
Few Reasons Why You Need Bodyguard Services
Few Reasons Why You Need Bodyguard ServicesFew Reasons Why You Need Bodyguard Services
Few Reasons Why You Need Bodyguard Services
 

Recently uploaded

مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 

Recently uploaded (20)

مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 

Tips on mugging,extortion and kidnapping

  • 1. “If you want total security, go to prison. There you're fed, clothed, given medical care and so on. The only thing lacking... is freedom.” Dwight D.Eisenhower Tips on Mugging/Extortion/Kidnapping
  • 2. …………………………………………………………… ………………………………………………………… Town Wise Layout of Karachi According to estimates from the Human Rights Commission of Pakistan, close to 2,284 people were killed in violent attacks in Karachi in 2012. Victims range from civilians to policemen, the paramilitary Rangers to development workers, journalists to lawyers.
  • 3. Behavior Suggestions on Mugging, Extortion and Kidnapping: • Be unpredictable. Do not settle into a routine. Vary times and routes to and from work or social engagements. • Remember, there is safety in numbers. Avoid going out alone. When traveling long distances by automobile, go in a convoy. Avoid dangerous areas of the city. • A privately owned car generally offers the best security. Avoid luxury or ostentatious cars. Keep your automobile in good repair and the gas tank at least half full. Driving in the center lane of a multiple lane highway makes it difficult for the car to be forced off the road. • You should immediately change your number if an extortionist calls also refuse to talk and do not engage in any conversation with him till you are told by the authorities pursuing your case for you.
  • 4. • Avoid moving in high risk areas in the city. • Be aware of what happens in the city by listening to the radio and subscribing to alerts. • Don’t use your cell phones enroute as excessive texting or scrolling takes up your concentration and you lose sense of things and people around you. • Don’t stop to share at any unusual scene on the road, it may be a set up. • CPLC has a self claimed success rates of 98.7% while trying out cases of kidnapping, give them a try, you have your life to lose in return. • Give the robber what he wants--money or personal items--without hesitation. Your life is worth more than your cash and jewelry. • Talk only if you're spoken to. Avoid getting angry and never speak sarcastically. Words are weapons that can offend and incite. Keep yours in their holster.
  • 5. A final word of Advice 1. The overwhelming majority of victims have been targeted in their vehicles on the way to or from work. 2. A large number of people targeted have ignored the most basic security precautions thus sometimes the obvious has to be stated again and again. 3. Violent tactics used by culprits are not static. As precautions prove effective, they change their methods, so you must change your security settings as well. As we say that security is an evolving process and should never ideally stop.
  • 6. CPLC – An Overview The following crime statistics for 2012 are based on reporting by the Citizens Police Liaison Committee (CPLC) and local law enforcement reports; however, many crimes remain unreported: 2,032 targeted killings (murders associated with political, sectarian or terrorist groups) 1,790 kidnappings for ransom 4,720 vehicle thefts with approximately 42 percent recovered 18,774 motorcycle thefts with approximately 12 percent recovered 23,962 cell phone thefts
  • 7. Maj ® Usman Farooq Monarch Security Services (Pvt.) Ltd. Southern Region Sweet Dreams