[Verse 1] Strange voice calls with secrets to share Government contracts, money to spare First red flag waves when strangers appear Document everything crystal clear Report to Security, channel secure Anonymous option keeps you obscure [Chorus] Six steps to safety when shadows draw near Report and record what you see and hear Legal and agencies standing by Clean devices when crossing the sky Six steps to safety, memorize well Foreign approaches, stories to tell [Verse 2] Security intake, confidential space Nature of contact, time and place Legal and HR join the dance Serious cases need vigilance CSIS Canada, FBI States Business liaison programs wait [Chorus] Six steps to safety when shadows draw near Report and record what you see and hear Legal and agencies standing by Clean devices when crossing the sky Six steps to safety, memorize well Foreign approaches, stories to tell [Bridge] Legal support wraps around Personal security, safe and sound Access review checks your accounts No punishment without evidence counts [Verse 3] Travel requests thirty days before High-risk jurisdictions need something more Briefings reveal the threat landscape Social indicators help you escape Loaner devices, forensics clean Personal gadgets stay unseen [Chorus] Six steps to safety when shadows draw near Report and record what you see and hear Legal and agencies standing by Clean devices when crossing the sky Six steps to safety, memorize well Foreign approaches, stories to tell [Outro] Post-travel debrief tells the tale Unusual contacts without fail Document incidents, check each device Security protocols worth the price
← Guards at the Digital Gate | Five Shields Against the Human Threat →