SWPA – Specialised Wildlife Protection Academy:
Thomas J Fleetwood is well renowned in the nature industry. His dedication to nature conservation started through his career in the South African defense force were he qualified in various specialized courses. He left as a part-time member and officer in 2004 in the rank of Major. He joined the North West Parks in 1998 as an honorary officer in the counter-poaching unit. Today he is listed on their records as a specialist service provider and is being used from time to time for specialist training and duties.
His experience in small team tactics, intelligence, survival, and tracking and anti-poaching operations contributed to the writing of a world class methodology dedicated to the protection of our wildlife heritage. This specialised methodology has been listed and accredited by the South African Police Services as the only accepted methodology in the RSA. SWPA is in existence for 9 years and serve a number of local and international clientele.
PASE – Practical Adaptive Survival Education:
Gert J Botha served as a permanent member is the SAP in both operational and management capacities, where he worked in the SAP Inspectorate under the MEC for Safety and Security as an internal consultant. He left as a part time member in the military rank of Captain and civil rank of Senior Work-study Officer. Gert specialized operationally in urban protection, which lend to the formation of PASE with the focus of transferring knowledge and skills to our communities. He successfully implemented an end to end SVA at a high end golf estate in Hartbeespoortdam with visible success.
Today he is still involved in both SAPS and local structures in combatting crime, analysing threats and leveraging industry best practice to the benefits if his clients.
The team will look at the following aspects, but not limited to this only, of the operations and derive recommendations accordingly:
The findings of this initial analysis will be presented in the form of a written report, and will contain an overview with recommendations based on these findings, to investigate and implement (if required) a data driven system with countermeasures which would reduce or block the opportunity for threats to exploit vulnerabilities, and as such build the uniquely qualified system specific to the client's requirements.