Protective Countermeasures

download Protective Countermeasures

of 41

Transcript of Protective Countermeasures

  • 8/13/2019 Protective Countermeasures

    1/41

    PROTECTIVE

    COUNTERMEASURES

    VIPPSC 10-13

  • 8/13/2019 Protective Countermeasures

    2/41

    TERRORIST SURVEILLANCE

    Although the goals of surveillance remainconstant, the means by which surveillance isconducted differ depending on who is interested

    in you or your protectee. The terrorist organization is interested in daily

    routine.

    Establishing an individuals schedule can provide

    terrorists with valuable information, such as thetime the target leaves for work, what route istaken and the kind of vehicle driven.

  • 8/13/2019 Protective Countermeasures

    3/41

    The Terrorist always needs to be one

    step ahead of security If the agent has an armored vehicle the terrorist should

    have an armor-defeating weapon, such as a rocket-propelled grenade (RPG) or a light, anti-tank weapon(LAW).

    The terrorist surveillance group looks for predictablepatterns which determine a logical place to stage an attack.

    The terrorist understands choke points.

    The protective detail is presented with greater challengesnear the protecteesresidence and work place since thepotential attacker knows that the target must be at eitherone of these two locations at some point during the day.

  • 8/13/2019 Protective Countermeasures

    4/41

    To confuse surveillance team, change:

    Routes;

    Times of departure and arrival

    Vehicles (stealth or dummy convoy);

    Number of vehicles in convoy; and

    Configuration of convoy.

  • 8/13/2019 Protective Countermeasures

    5/41

    All protective detail must vary as much inaccurateinformation as possible, while continuing toprovide comprehensive surveillance/counter-surveillance.

    All surveillance/counter-surveillance should be

    immediately reported to the detail leader todetermine its threat level.

    Terrorists usually employ newer members to

    conduct initial surveillance as part of their testmission.

  • 8/13/2019 Protective Countermeasures

    6/41

    These individuals often are not trained in

    surveillance tactics and, as a result, are easilydetected.

    Also, if one of these new operatives arecaptured by police they will have little, if any,

    information about the inner cells of the

    terrorist structure.

  • 8/13/2019 Protective Countermeasures

    7/41

    PRO-ACTIVE VS REACTIVE SECURITY

    MEASURES

    Certainly marksmanship proficiency andspecialized driving skills are necessary, however, ifan attack gets to where one needs to use these

    skills, when a series of opportunities were missedin predicting and thus preventing the attack fromoccurring it means you already failed to protectyour protectee.

    Pro-active measures uncover an attack plan whilein its preparation stage.

  • 8/13/2019 Protective Countermeasures

    8/41

    These measures include detecting

    surveillance, piecing together intelligence

    reports and identifying pre-incident indicators.

    Pre-incident occurences may be unrelated but

    sometimes, when examined together, they

    provide clues that terrorist activity is in the

    works.

  • 8/13/2019 Protective Countermeasures

    9/41

    Types of Pre-incident indicators

    An increase in criminal activity, i.e., car thefts,passport fraud, stolen weapons.

    Uniforms from public utility companies, militaryfacilities and police departments are reportedmissing.

    There is new construction along the protecteesprimary route.

  • 8/13/2019 Protective Countermeasures

    10/41

  • 8/13/2019 Protective Countermeasures

    11/41

  • 8/13/2019 Protective Countermeasures

    12/41

    What indicators would differentiate between

    suspected and actual surveillance?

    Correlated movement

    Inappropriate or crude disguises.

    Communications equipment

    Physical gestures which coordinate with the

    protecteesmovement.

    Note taking.

  • 8/13/2019 Protective Countermeasures

    13/41

  • 8/13/2019 Protective Countermeasures

    14/41

    If surveillance is verified, do not apprehend thesurveillant.

    Rather, keep in mind that initial surveillance isconducted by newer terrorist members. If theymake mistakes, the detail/intelligence units canprobably identify and neutralize them.

    Employ counter-surveillance methods to uncoverinformation or a safe house which may lead tothe core of the organization.

  • 8/13/2019 Protective Countermeasures

    15/41

    One method is an inconspicuous tail or sweepcar/motorcycle.

    The terrorists surveillance vehicle will trail the

    convoy, taking an inappropriate interest in thedetail.

    The sweep car will be effective in this manner

    because the terrorists attention will be focused onthe detail in front of him and they will not beaware of whats behind them.

  • 8/13/2019 Protective Countermeasures

    16/41

    TYPES OF SURVEILLANCE

    Fixed surveillance

    The surveillant remains in the same position over time toobserve the activities of a particular subject or location.

    Examples:

    (1) phone booths,

    (2) bus stops,

    (3) garages,

    (4) parked vehicles,

    (5) rented apartments,

    (6) vendors, only limited to the terrorist imagination.

    They attempt to blend in with the dress, mannerisms, andtime schedules of the local populace.

  • 8/13/2019 Protective Countermeasures

    17/41

    Moving/Mobile Surveillance

    The subject is followed on foot or by vehicle. The terrorist may use any number of surveillants

    and various types of vehicles in doing this.

    Technical Surveillance

    Equipment used to record conversations in rooms,

    automobiles, or from telephones.

  • 8/13/2019 Protective Countermeasures

    18/41

    Combination Surveillance

    Any combination of fixed, moving, or technicalsurveillance.

    Progressive Surveillance Time intensive, involving surveilling a subject

    along a route, in successive segments, over an

    extended period of time.

  • 8/13/2019 Protective Countermeasures

    19/41

    COMMON TERRORIST SURVEILLANCE

    MISTAKES

    Vehicles parked in prohibited zones.

    Vehicles parked in the same spot for an extendedtime, with possible surveillants sitting in the frontseat.

    Vehicles that stop or start as the protectee ordetail moves, especially motorcycles.

    Vehicles that pass the target and park.

    Vehicle that goes through an intersection slowly,rounds a corner slowly or pokes its nose arounda corner and then withdraws.

  • 8/13/2019 Protective Countermeasures

    20/41

  • 8/13/2019 Protective Countermeasures

    21/41

    Vehicles moving on parallel streets at roughly

    the same speed as the protectee.

    Vehicles apparently hiding behind traffic,

    pulling out as if to pass, then dropping back.

    Vehicles passing in a traffic circle until thedetail has taken an exit.

    Vehicles stopping nearby when the protectee

    or detail stops.

  • 8/13/2019 Protective Countermeasures

    22/41

    Persons dismounting vehicles when the

    protectee or detail stops. Persons turning away when observed by the

    protective detail or SD team.

    Persons hesitating or looking around whenentering a building that the protectee has just

    entered.

    Persons leaving or entering a store, restaurant,etc, immediately before or after the protectee.

  • 8/13/2019 Protective Countermeasures

    23/41

    Persons who begin to move as the protecteeor detail does, or stop as they do.

    Persons standing on the street or in lobbies,

    reading newspapers or magazines. Broken down vehicles.

    Sloppy suveillant shift changes near the

    residence. One vehicle arriving, anotherdeparting. Possible communication betweendrivers.

  • 8/13/2019 Protective Countermeasures

    24/41

    Any vehicle with an altered or obliterated

    license plate in or near a choke point.

    Work crews in or near chokepoints. Check

    vehicles, equipment, and clothing, especially

    the footwear. Inquire with appropriate agency

    to verify the legitimacy of the work order.

    Persons inappropriately dressed for the area

    or season.

  • 8/13/2019 Protective Countermeasures

    25/41

    ROUTE SURVEY

    A route survey is simply an area street mapindicating where the detail and protectee willbe travelling.

    It is the responsibility of the protective detail(both the protective drivers and advance

    detail) to plot out the routes that will be takenor could be used to get from point A to pointB.

  • 8/13/2019 Protective Countermeasures

    26/41

  • 8/13/2019 Protective Countermeasures

    27/41

    The ideal route will have minimal choke points

    and many strong points.

    Remember, it is likely the attack will occur in

    or around the area where surveillance is

    taking place.

  • 8/13/2019 Protective Countermeasures

    28/41

    SURVEILLANCE DETECTION ROUTE

    (SDR or pag-pag)

    One method of detecting or confirming

    surveillance is through the use of a

    surveillance detection route (SDR). The SDR

    forces correlation between the surveillanceand the targeted individual.

    The SDR uses a logical detour in which the

    target doubles back on their route.

  • 8/13/2019 Protective Countermeasures

    29/41

    This natural reverse should allow the target

    to observe anyone following them into and

    out of the SDR.

    It would be very likely that anyone would

    make the same combination of turns.

  • 8/13/2019 Protective Countermeasures

    30/41

    OBSERVATION

    Observation is the complete awareness by an

    individual of his surroundings achieved

    through maximum employment of the senses.

    Expert observation enables on to recognize

    and recall any object or situation accurately

    and completely.

  • 8/13/2019 Protective Countermeasures

    31/41

  • 8/13/2019 Protective Countermeasures

    32/41

    When Observing vehicles, the following

    sequence should be followed:

    First its plate number, general type, size, condition

    and color

    any distinguishing characteristics

    Its make, model and year.

    Identifying information on name plates and bodyparts. i.e. commemorative plate.

  • 8/13/2019 Protective Countermeasures

    33/41

    When observing People, notice their:

    Sex

    Race(i.e.): Caucasian, American Indian. Black,

    Mongolian, or Malayan. Other terms, such asmestizo or Hispanic, may be more descriptive of

    the local populace and should be learned.

    Color of Skin. Height

  • 8/13/2019 Protective Countermeasures

    34/41

  • 8/13/2019 Protective Countermeasures

    35/41

  • 8/13/2019 Protective Countermeasures

    36/41

    Unaware of the surroundings

    An attack on an individual in condition white will probably be successful.

    General awareness of surroundings.

    You perceive events and changing in condition yellow 24 hours a day.

    Heightened state of awareness.

    A person can only stay in this condition for about 3 to 4 hours.

    State of Action - FIGHT or FLIGHT

    DURING this state a person will exhibit the symptoms of physical reaction tohigh stress.

    A person in this state is so overwhelmed by the situation they are shocked intoan inability to react.

    An attack on a person in this state will probably be successful.

  • 8/13/2019 Protective Countermeasures

    37/41

    Unaware of the surroundings

    An attack on an individual in condition white will probably be successful.

    General awareness of surroundings.

    You perceive events and changing in condition yellow 24 hours a day.

    Heightened state of awareness.

    A person can only stay in this condition for about 3 to 4 hours.

    State of Action - FIGHT or FLIGHT

    DURING this state a person will exhibit the symptoms of physical reaction tohigh stress.

    A person in this state is so overwhelmed by the situation they are shocked intoan inability to react.

    An attack on a person in this state will probably be successful.

  • 8/13/2019 Protective Countermeasures

    38/41

    TYPES OF ATTACK

    Looking at the route, could the terrorists

    succeed in kidnapping the protectee or

    staging a bomb attack?

    Is there an escape route, cover or

    concealment for the terrorists?

  • 8/13/2019 Protective Countermeasures

    39/41

    Weapons at close range - sub-machine gun,

    small caliber weapons. EXAMPLE: assassination attempt on President

    Reagan.

    Stand-off attack - RAG rocket, hand grenade.

  • 8/13/2019 Protective Countermeasures

    40/41

    Kidnapping / Selective violence.

    Hostage must remain unharmed to be used as abargaining chip for the terrorists.

    EXAMPLE: Hans Martin Schleyer kidnapping,Cologne, Germany 2977 by R.A.F.

    Explosives / Random violence.

    EXAMPLE: Secretary of State Schultz, bombing. La

    Paz, Bolivia 1986.

    Escape.

  • 8/13/2019 Protective Countermeasures

    41/41

    SUMMARY

    The protective detail is responsible for

    familiarizing itself with all possible routes.

    Strong points and escape routes should be

    identified on a street map and visually verified.

    Establish what is normal in an area to be able to

    identify suspicious activity.

    Know what type of attack could be used againstyour Protectee in the area you will be working.