Executive Protection - A Practitioner’s Overview
Transcript of Executive Protection - A Practitioner’s Overview
1
Executive Protection -A Practitioner’s OverviewPresented by Robert D. Shuster
Course Overview
Introduction and Objectives Operational Uniqueness / Reactive vs. Proactive Target Selection Criteria Surveillance Objectives Surveillance Methods and Tactics
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Surveillance Detection Route Planning / Unpredictability Counter-Surveillance Protective Intelligence Operational Security “Perimeters” of Protection Advance Security Surveys
Course Overview (cont.)
Types of Protective Details Limited Personnel Operations Weapons – Use and Value Protective Mindset Protective Operations
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Protective Vehicular Operations Command Post Operations Emergency Evacuation Plans / Medical Evacuations Personal Relationship Control Protective Courtesies EP as a Small Business
2
Introduction and Objectives
Job description
Review the differences in operating tactics from other types of security or law enforcement
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Compare the various types of protective details
Overview of skill sets required
Operational Uniqueness
REACTIVE
Law Enforcement / Security
Respond to the problem or situation
PROACTIVE
Executive Protection
Cover and evacuate away from situation
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Take charge and gain control of the situation
Often investigate after the fact
Use weapons from behind cover
Take charge and control of the protectee
Protective advances -think ahead to prevent / avoid / divert
They are the cover –weapon limited
Target Selection Criteria
Motivations
Wealth / ransom
Position and status
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Politics or controversy
Media worthiness
Personal vendetta or revenge
Leverage for demands
Embarrassment
3
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Target Selection Criteria (cont.)
CARVER
Criticality – to the operation, company, organization
Accessibility – ease of approach without challenge
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Accessibility ease of approach without challenge
Recuperability – can organization easily recuperate
Vulnerability – vulnerable to assault planned
Effect – effects of the assault
Risk – risks relative to the gain
4
Target Selection Criteria (cont.)
Make Your Protectee a Less Attractive Target
Unpredictability
Difficult to pinpoint for attack
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Evident that security effort is put forth
Continuing protective intelligence
Continuing surveillance awareness
Maintain operational security
Maintaining disciplined protective practices
Surveillance Objectives
Pick a target from set of equally valuable ones using risk reward balance/easiest/predictable
Pinpoint selected target - place and time that is predictable and conducive to the assault to be
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
predictable and conducive to the assault to be attempted
Seeking a comfortable enough environment within which to attack
Surveillance Methods and Tactics
Tactics may differ from law enforcement surveillance
Usually not as sophisticated and easier to spot
No community cooperation
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Following on typical daily routes
Static observation around home or office
Some mobile observation on routes
Inquiries at home, office, or on internet
5
Surveillance Methods and Tactics (cont.)
Methods
FootFoot - One person, multiple persons, teams
VehicularVehicular - Cars, trucks, vans, bicycles,
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
VehicularVehicular Cars, trucks, vans, bicycles, motorcycles, aircrafts, boats
StaticStatic - Observation posts, stake-outs, technical (electronic)
Surveillance Methods and Tactics (cont.)
Techniques For Foot Surveillance
One-Man Surveillance
Two-Man or “AB” Surveillance
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Three-Man or “ABC” Surveillance
Techniques for Vehicle Surveillance
One-Vehicle Surveillance
Two-Vehicle Surveillance
Multi-Vehicle Surveillance
Surveillance Methods and Tactics (cont.)
2A
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
2
1
1
2
B
B
T
A
6
Surveillance Methods and Tactics (cont.)
A
2
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
T
A
T
BC
C
B
1
2
1
2
1
2
1
2
Surveillance Methods and Tactics (cont.)
TB
A1
22
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
T
B
A
1
1
1
Surveillance Methods and Tactics (cont.)
TB 22
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
T
A
A
B
1
2
1
1
7
Surveillance Methods and Tactics (cont.)
Loose Surveillance
Subjects not kept under constant observation
Harder to detect
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Harder to detect
Close Surveillance
Subjects are kept under observation continuously
Surveillance is maintained at all times
Easier to detect
Surveillance Methods and Tactics (cont.)
Target Vulnerability Assessment
Residential - the most difficult areas in which to operate
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Office - usually easier to observe because there are more opportunities to blend
Surveillants - find a location to monitor activity at the residence or office without being detected
Surveillance Methods and Tactics (cont.)
Route Analysis
Times - home to office
Choke points
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Choke points
Limited or no alternates
Surveillance vantage points
Possible assault locations
8
Surveillance Methods and Tactics (cont.)
Hobbies and Family Activities
Are there routine activities
Degree of public exposure
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Degree of public exposure
Any other common pattern activity
Possible source of information
Surveillance Methods and Tactics (cont.)
Collect Information and Document Activity
Trash, pretext calls, door to door ruses (surveys, sales calls, servicemen…)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Video and still photography
Document exact times, places, and circumstances
Personal descriptions/vehicle descriptions
Maps of routes
Any protective practices
Surveillance Detection
What are You Looking For?
Repeats of people or vehicles
Out of place for the environment
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Strange behavior or actions – people who act like they’ve been caught doing something
e.g. quick reversal, quick look away, walking fast while looking across the street
People taking photographs of your home
especially from inside a vehicle
9
Surveillance Detection (cont.)
Where Should You be Looking?
Around home, office parking lots, and “choke points” or funnels in between
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Daily commuting routes
Frequently visited locations
Most executive kidnappings have been carried out in the driveways or parking lots upon exit or approach of vehicle / you’re distracted!
Surveillance Detection (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Surveillance Detection (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
10
Surveillance Detection (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Surveillance Detection (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Surveillance Detection (cont.)
Techniques for Spotting Surveillance:
Pay attention
Double backs or reversals
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Channeling
Quick direction changes
Have someone else help you look
Counter-surveillance
Do not confront individuals directly
11
Surveillance Detection (cont.)Common Mistakes in Vehicular Surveillance Activity:
Parking in prohibited zones
Stopping and starting correlations
P i d ki f tl
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Passing and parking frequently
Erratic moves in traffic
False signaling
Running traffic lights or other violations
Flashing lights between vehicles
Constant distancing and ducking
Surveillance Detection (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Surveillance Detection (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
12
Counter-Surveillance
Techniques used to draw out surveillance activity
Active counter-surveillance (C/S) - implemented if it does not jeopardize the security mission
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Active C/S should be conducted by a C/S team and not by those working close protection
Have C/S team or agent notify local police
Counter-Surveillance (cont.)
Decoy protective movements - effective way to detect surveillance, without altering the principal’s schedule
Stationary C/S points along the traveled routes
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Stationary C/S points along the traveled routes record license plates / descriptions of suspicious vehicles following the motorcade
Conducted for several days to compare and evaluate observations of any recurring vehicles or individuals
Route Planning / Unpredictability
Employ the Concept of Designed Randomness
Route variance – how many?
Time variance – how much?
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Create an unacceptable window of discomfort
A protective level of unpredictability incorporates 2-3 different routes and a 1-1.5 hour time window
Modify your route once out of immediate neighborhood and vary departure/arrival times
13
Route Planning / Unpredictability (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Route Planning / Unpredictability (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Protective Intelligence
Any information that assists in making mission decisions and designing protective security measures
Identifies and evaluates persons, groups, or
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
activities which may present a danger to the protectee
Increases agent knowledge of the environments
Sources of information are limited only by your imagination
14
Operational Security
All scheduled movements
Protective capabilities
Create illusion of larger detail
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Vehicle rotation if possible
Limit what is available on internet
Don’t share with others unless necessary for operation
Don’t discuss special equipment if any
Don’t discuss spending, travel, life-style habits, etc.
“Perimeters” of Protection
Concept of Protective Rings
Three concentric circles around the protectee
inner most circle - the protective escort agent(s)
th t i l th i di t it i t
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
the next circle - the immediate security perimeter
the third - advance work/planning/protective intelligence
Even small 1-2 person protection teams can have these circles with assistance from other sources
Remember that people have to want to help you
Advance Security Surveys
Know the conditions at a location before you arrive
Affect those conditions through preparation
Foresee problems and take steps to prevent or
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Foresee problems and take steps to prevent or minimize - better than reacting to them when you arrive
Trip advances - done to coordinate out of town travel
Site advances - done to coordinate sites visited on those trips or during local everyday movements
15
Advance Security Surveys (cont.)
General Components of Trip Advances:
Pre-trip country or city research and intelligence
Airport advance – both ends
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Airport advance both ends
Hotel advance – other lodging
Site visit advance(s) –meetings/events/meals/entertainment
Advance Security Surveys (cont.)General Components of Trip Advances: (cont.)
Ground transportation coordination – route planning / route running
E i di ti
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Emergency service coordination
Other entity coordination – host venue, local police, other security involved, etc.
Possible country evacuation
Advance Security Surveys (cont.)
General Components of Site Advances:
Routes with alternates to the location
Preferred arrival points – vehicular and on foot
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Secured vehicle parking
Venue layout with exits/entrances noted
Security posting – access control
Primary occupancy area for visit – seating, stage, crowd expected, etc.
16
Advance Security Surveys (cont.)
General Components of Site Advances: (cont.)
Expected agenda and duration of the visit
Amenities – restroom, safe holding area, VIP area, etc.
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Amenities restroom, safe holding area, VIP area, etc.
Coordination with any other entities – host groups, law enforcement, venue security, company associates, etc.
Emergency evacuation routes
Departure plan
Types of Protective Details
Single Protectee
24/7 protective operations including residential and travel
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Full daytime activity protection without residential –local only or including travel
Portal to portal – limited duration protection – local only – single protectee
Executive travel only
Types of Protective Details (cont.)
Multiple Protectees
Visiting protectee – 24/7 with hotel coverage
Visiting protectee – portal to portal – event related
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Visiting protectee portal to portal event related
Recurring or one time visits
Security driver only for a quick city visit
17
Types of Protective Details (cont.)General Dynamics of 24/7 Protection
Single protectee and family – relationship develops
Routine patterns becomes a challenge - protectee must work with the detail on unpredictability
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
p y
In the home and office environment – privacy balanced with good security
Travel with the executive - maybe continued residence security while the executive is away
Executive choice vs. board choice
Level of cooperation may differ
Types of Protective Details (cont.)General Dynamics of Part-Time Protection
Different protectees or repeat visits by the same
Relationship development limited
R d d d f ti tt
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Reduced danger of routine patterns
Usually not in the home or office environment – but privacy still an issue
Usually an organizational requirement for the engagement as opposed to personal choice
Executive usually cooperative because of the nature and cause for the temporary protection
Limited Personnel Operations
Remember Your Priorities and Mission Objectives
Highest priority - the ability to cover and evacuate the principle from danger
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
A very close second - never having to do so because you have pre-empted trouble through good advance preparation
How do you work a protective detail by yourself?
18
Limited Personnel Operations (cont.)
Consider the “Leapfrogging” Method
Continually hopping out in front of a protectee’s vehicular movements - meeting curbside for escort
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Once the next movement is at hand, you hop out ahead again - continues throughout the day
Leaves time during the day without physically being near the protectee
Which is more dangerous – leaving coverage gaps or having movements into unadvanced locations
Limited Personnel Operations (cont.)
One Agent
Always do some basic advance work via telephone
Discuss what the protectee is more comfortable with
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Discuss what the protectee is more comfortable with
Use other resources like location security, other staffers, executive drivers, etc. to gather advance information
Use any form of assistance that is available to you corporate resources / contracted resources / staff
Limited Personnel Operations (cont.)
Two Agents
Two dedicated agents – one remains with the protectee and one on continual advance movement
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Occasional double coverage if possible in between
Factors which will vary your approach - specific circumstance/location/event/routine/visibility/profile/many others
There is no one best way
19
Weapons – Use and Value
Inner circle protective personnel - firearms are not recommended
Cover with your body and evacuate the protectee out of the situation
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Do not shoot it out and draw fire towards the protectee
Only exterior perimeter personnel away from the inner formation should be armed
Must attempt to draw fire away from the formation – not shoot in place
Protective Mindset
Protective Mindset Throughout the Day
Constant concentration
No daydreaming
Focus on surroundings
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Focus on surroundings
Thinking ahead – stay off the X
Mental Awareness Drills
Am I prepared to react
Do I know what is right outside my immediate environment
Am I ready for our next movement
Protective Operations
Concepts of Formations and Positioning
360 degrees visual responsibility – divided
Spacing – reaction and discretion
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Unobtrusive – low key
Individual reactions of each position
See first/enter first
Occupied area/immediate surroundings
Best positions/best compromises
20
Protective Operations (cont.)Multiple Agents
360 visual responsibility divided
Communication between
Single Agent
Still 360 visual – danger probability
Communication with any
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
team members
Immediate reactions of each position
Positioned to cover and evacuate
Communication with vehicles
one else helping
Immediate reactions
Positioned to cover and evacuate
Communication with driver
Diamond Formation
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Box Formation
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
21
2 Person Positioning
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Stairway Positioning
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Escalator
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
22
Elevator Entry
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Fence Line Situation
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Receiving Line
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
23
Head Table
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Stage
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Protective Operations (cont.)
Physical Immediate Action Guidelines:
Cover and evacuation drills
Close in assault response
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Close in assault response
Vehicular evacuation or shelter in place
Emergency situational assessment
24
Protective Operations (cont.) Communications
Agent to agent/drivers – radios, briefings
Agent to CP – radios, cell phones, written reports
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
CP to corporate security – cell phones, written reports, logs, etc.
Emergency services – cell phones, visits
Protective Operations (cont.) Residential Concerns
Physical security/access control
Security systems
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Family security procedures
Personal and privacy issues
Protective Operations (cont.)
Emergency Contingencies
Medical emergency
Law enforcement response
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Law enforcement response
Community emergency
Total evacuation from the area
25
Protective Vehicular Operations
General Considerations
Managing the vehicles
Managing the drivers
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Managing the drivers
Protective motorcade operations
Evasive driver training
Special equipment to consider
Protective Vehicular Operations (cont.)
Arrivals and Departures
Daily commuting routes/variance to alternates
Advance agent meeting curbside
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Advance agent meeting curbside
Communication with the drivers
Positioning the vehicles
Agent positions around the vehicles
Smooth transition to walking formation
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
26
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Command Post Operations
The Residential Command Post (CP)
Center of communication, documentation, equipment, camera monitoring, intelligence and logistics for the detail
Set up in the basement / garage of protectee’s home
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Set up in the basement / garage of protectee s home
Team member dedicated to staffing the CP - coordinates all team communications and tracks whereabouts of the detail – active post
Coordinates with family on all visitors or service
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
27
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Command Post Operations (cont.)The Office Command Post (CP)
Alternate location if protective operations are not 24/7
Located on the executive floor near the protectee’s office
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Center for communication, documentation, executive transportation, travel coordination and planning of the executives daily movements
Coordination with executive assistant
28
Command Post Operations (cont.)
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Command Post Operations (cont.)The Temporary Command Post (CP)
Typically in a hotel room – adjacent to protectee’s room
If mobile perimeter cameras are set up - CP agent will monitor those as well – active post
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
monitor those as well active post
All necessary maps, contact lists, itineraries, emergency protocols and numbers, daily activity logs, incident reports, agent necessities, valuables storage, etc.
Focal point for all operations for the detail on travel
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
29
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
30
Emergency Evacuation Plans/ Medical Evacuations
Reaction plans for various emergency situations
Each team member understands their role in the process
Coordination and directives not all dictated on the fly d i th f i f th t
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
during the confusion of the event
Plan for the worst – hope for the best
Emergency Evacuation Plans/ Medical Evacuations (cont.)
Examples to Plan For:
An assault attempt at the home
An assault attempt during daily commute
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
A fire related incident at the home
Fire or other evacuation required at the office
A health related incident
Media or crowd “rush” at an event
Emergency Evacuation Plans/ Medical Evacuations (cont.)
Types of Activities to be Coordinated:
Who will cover the protectee immediately
Who will coordinate communications
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Possible safe havens
Primary and alternate evacuation routes
Where will the vehicles stage and specifically locate for evacuation from a site
Routes to the hospital from all stops
31
Emergency Evacuation Plans/ Medical Evacuations (cont.)
Medical Evacuation
Decision making regarding rerouting to hospital in an emergency
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Will air transport be required
Coordination with emergency response personnel –police/fire-rescue/govt. agents/etc.
Who is trained for administering first aid/CPR
Who will notify all required parties and family
Personal Relationship Control
Eventually you will develop a close personal relationship with the protectee, family member(s) or both - When does that become dangerous?
Far more likely on a full time 24/7 protective detail
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Far more likely on a full time 24/7 protective detail
They treat you as a friend and not a professional -will resist listening to your advice when inconvenient for them
Remember that you really don’t “run in their circles”
Control attractions – they are a distraction
Protective Courtesies
Discuss with protectee how you operate during foot and vehicle movements
What you see on the job is never discussed outside the job
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Errands become part of the drill - control them if they diminish focus on protection
Be as unobtrusive as possible
32
Protective Courtesies (cont.)
You are protecting their dignity as well as the physical person - family secrets
Children are a challenge - if they like you and understand you they are much easier to work with
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
understand you, they are much easier to work with
Uncooperative teens can be a nightmare
EP as a Small Business
When the glamour wears off – tedious work
Understanding the client relationship
Your limits of authority when out of law enforcement
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
Your limits of authority when out of law enforcement
Tapping the “professional courtesy” network
Regional markets
Licensing/insurance/liability/pricing/expenses/marketing/geographic reach/networking/etc.
Questions?
Robert D. Shuster
1.440.878.5114
IMAC © 2010 All rights reserved. Content reproduction strictly prohibited.
1.440.878.5114
www.imacservices.com