0% found this document useful (0 votes)
249 views105 pages

Personal Protection Operations.

This document presents the key concepts and strategies for protecting VIPs. It describes the three concentric circles of protection, with the first circle closest to the VIP and responsible for their immediate protection, the second circle providing additional security, and the third circle focused on intelligence gathering. It also explains the four fundamental steps of VIP security: prevention, protection, reaction and evacuation. In general, the document
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
249 views105 pages

Personal Protection Operations.

This document presents the key concepts and strategies for protecting VIPs. It describes the three concentric circles of protection, with the first circle closest to the VIP and responsible for their immediate protection, the second circle providing additional security, and the third circle focused on intelligence gathering. It also explains the four fundamental steps of VIP security: prevention, protection, reaction and evacuation. In general, the document
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 105

fniofn:f97

“ Kings of Israel Square


Tel Aviv. November 4, 1995
NES
When you think about SAFETY , you cannot guarantee the
100% PROTECTION.

90% PREVENTION

05% REACTION
05% INTUITION

PREVENTION represents 90% in Safety, which is why the “Actions” must


be concentrated at this stage.
A PROTECTION
N
(dignitary,
highest public official
level, diplomat, personality,
businessman or any person HUT

need protection).

SIGNIFICANCE OF AN ACT
AGAINST A VIP.
Risk Comprehensive Scheme
Factors that threaten of Violent and Non-Violent
Security
Risks
DELINQUENCY
Q TERRORISM COMMON

R
Yo
N SABOTAGE
c
Yo KIDNAPPING
Q
TO S. L. MURDERS
MRTA SELECTIVE
l
AN INFILTRATION
gS LABOR
ATTACKS
WITH
Ye EXPLOSIVES
s AN
Dc
POVERTY
OR — EARTHQUA
CRITICISM
KES
N ► CRISIS
RISKS CRISIS DEPRESSION SOCIAL
d ECONOMIC
— —• FIRES ECONOMIC
TO NATURAL LOSS OF
R ACCIDENTS CAN
PURCHASING
Yo — PERSONAL
»

COVERS EVERYTHING
TYPE OF CRIMES
____• ASSAULT AND ROBBERY
BY ARMED HAND
HOMICIDES

INJURIES

THEFT
ACCORDING
MODALITY
SCAMS
AND
FRAUDS
» HOME
PENETRATION

UNEMPLOY
MENT
MIGRATION

MARGINALITY

UNSAFETY
COLLECTIVE

ACTIONS
OF
STRENGTH
FUNDAMENTALS OF THE PROTECTION OF PERSONALITIES

Since ancient times, attacks on people have existed, fundamentally when they
perform tasks of certain relevance, occupy representative positions within society
or participate in political activities, conditions arise that unfortunately, on certain
occasions, are risky for them. MAIN CAUSES OF ATTACKS ON PERSONS

POLICIES
IDEOLOGICAL
PSYCHOLOGICA
L
ECONOMIC
RACIAL
RELIGIOUS
PERSONAL
SOCIOLOGICAL
SOURCES OF HAZARD

> Activity of local or national armed terrorist groups.


> Presence of organized crime gangs.
> Political and/or professional enemies.
> Resentful people or people with psychopathological alterations.
> Attendance at mass events with the presence of hostile groups.
> Negligent actions of the protected.
> Organized crime. International Networks (Mafia), Drug Trafficking, Arms
Trafficking and International Terrorism.
> Common crime. Personal and economic interests.
> Isolated individuals or organized groups.
PHASES OF SECURITY
PEOPLE
• Prevention Phase. Preventive actions with sufficient advance notice of its
manifestation, capacity for observation, detection and deterrence, observation is
of great importance.
• Protection Phase. Physical coverage provided by protective
equipment through its positioning close to the VIP.

• Reaction Phase. Response capacity to neutralize an event,


generally at the beginning of the attack or aggression.

• Evacuation Phase. Ability to evacuate the protected person


to a quiet area free of danger, in the event of an emergency
situation.
OBJECTIVE OF TRAINING IN THE
VIP PROTECTION

• TO. PREVENTION. Passive and Active.

• b. REACTION. Ability to act quickly and effectively when push comes to


shove.

• c. RESCUE. Rescue the VIP victim of an attack, with the aim of saving his
life.

RESCUE
REACTION
PREVENTION
PASSIVE - ACTIVE
SPHERICAL THEORY OF PROTECTION
It consists of covering the space contained in a sphere, the center of which is the person
to be protected.

AIR

SURFACE

SUB FLOOR
THEORY OF CONCENTRIC CIRCLES

VIP
1

3
❖ THE FIRST CIRCLE OF PROTECTION.
It is constituted by the personal protection or escort team that acts in the closest environment of the protected person,
configuring a security capsule whose purpose will be to protect the physical integrity of the protected person and ensure a
neutralized area of risks, in all the movements made, mainly to on foot and/or in vehicles, as well as those situations of a
static nature that arise, proceeding to their immediate evacuation from the place of danger, to a previously established
safety zone.
❖ THE SECOND CIRCLE OF PROTECTION.

It is made up of uniformed or non-uniformed


security personnel, in an undetermined number
that varies depending on the areas to be covered
(places to visit, itineraries, etc...), all of them
integrated into a personal protection and security
device; The agents will perform different functions
and tasks: outposts, surveillance posts, counter-
snipers,
aerial surveillance, motorcyclists, counter
surveillance etc...
❖ THE THIRD CIRCLE OF PROTECTION.
It is limited to the scope of information in order to detect the presence of suspicious elements or possible criminal
actions against the protected person. The security personnel integrated into this circle within the surveillance and
personality protection device are normally located away from the
himself, the protected person not remaining within of his surveillance field and
COUNTER SURVEILLANCE
It is a security activity whose primary function is the detection of risks and criminal
elements, when they are collecting information about possible objectives and even
when they have decided to commit a criminal action.

Counter surveillance can be established sporadically or


systematically, on the itineraries and points of origin and
destination of the caravan in which the personality travels.
SEQUENCE OF A TYPICAL KIDNAPPING
ADJUSTM REPORT
ENT
ROUT
WALKING ES
ENG HOURS HOME-
WORK DEPARTURE
INTERVIEWER
DISPLACEME
OTHER NT
MODS. VEHICLES
SECURITY
UP TO 15 PERSONNEL
DAYS
ARMAMENT

EXECUTION
SPECIAL GROUP
DYNAMIC PROTECTION ON FOOT

It is the security device that is established to ensure the protection of a person in all their
movements on foot, and in those situations of a static nature that occur in the execution of
the operational plan, such as attendance at conferences, meetings, restaurants, in
facilities. or buildings not controlled by personnel from the three
protection circles.
PROTECTION TECHNIQUE IN MOTION

Travel is common in people's daily lives. In the cases of personalities with escort
service, the movements are carried out frequently and generally in short distances, but
not without risks, generally it constitutes a point very vulnerable.

The command structure must be established previously.


in an escort service, regardless of the existence of other
higher hierarchical managers, who participate in the planning

TEAM STRUCTURE
and coordination of the protection device
comprehensive, at the organizational level.
SECURITY BOSS

He is directly responsible for Comprehensive Security .

- Plans, organizes, supervises and controls personal protection services, assigns the human
resources and material means necessary for the correct and
effective execution of personal security operations.

- Prepares and makes the members of the operational teams aware of


the tactical and technical execution regulations that describe the
general functions, the basic principles of action, as well as the
operational and administrative control procedures of the services.
HEAD OF PROTECTIVE STAFF
He is operationally responsible for :

> The communications, evolutions and disposition of the different components of the
team, which make up the personal escort of the protected person.

> Supports the head of Security in the planning of


services and maintains permanent liaison in the
execution of the personal security operation.
EQUIPMENT COMPONENTS

Are responsible for:


> The immediate protection of the protected person,
occupying at all times the position indicated by
the crew chief or the one they deem appropriate
depending on the situation that arises, with the
aim of keeping the area close to the protected
person monitored and controlled.
ORGANIZATION AND POSITIONING
ESSENTIAL
The most common composition used by escort services are:
SECURITY BOSS

- Plan, organize,
CREW HEAD execute, supervise and
check.
PROTE
CTIVE -HR and material resources.
-Develop operational plans .

SECURITY ESCORTS
ON FOOT AND/OR BY
VEHICLE
President Obama lands at Miramar
B Roll
Sept 26,2011
R/T: 2:27

Video by Sgt. W. Zach Griffith


MCAS Miramar

B Roll of Air Force One landing, and President Obama greeting


troops and family members on his way to a fund raiser in La Jolla,
Calif.
AN AGENT OF PROTECTION
> The area to be covered is 360°, normally it will be located to the right of the
protected person and slightly behind, as a starting point, evolving its positioning
depending on the characteristics of the place and the
specific dangerous situation found at each moment,
taking into account under his field of vision to the
dignitary, without neglecting the surveillance of the rear
area.

> Your ability to respond (neutralize) could be adequate


depending on the number of aggressors. However, in the
event of a possible evacuation, the chances of doing so
successfully are minimal. The degree of prevention can
be good, maintaining a basic level of protection.
AN AGENT OF PROTECTION

A
N
TWO AGENTS OF PROTECTION
> The area to be protected by each of them will be 180°.
The person responsible for the personal protective
equipment will be placed slightly behind the protected
person's right and the other escort will be placed on the
left flank or in front, depending on the characteristics of
the place and specific danger situation, ensuring a
guarded and protected area around the dignitary.
controlled.

> This alternative provides us with a good level


prevention and protection, with its reaction and
evacuation capacity being medium.
TWO AGENTS OF PROTECTION

A
N
Q
A
THREE AGENTS OF PROTECTION

> The area to be protected by each of them will be 120°. The


person responsible for the protective equipment will be
positioned in a similar way to the previous scenario, the rest
of the team will be positioned controlling the left flank and the
front, without forgetting the rear area, adapting to the
characteristics of the place and the possible danger situations
around the dignitary, configuring a triangle formation.

> This alternative provides us with an adequate degree of


protection, reaction and evacuation, as well as a high level of
prevention.
THREE AGENTS OF PROTECTION
FOUR, FIVE OR SIX PROTECTION AGENTS
> The area to be protected by each of them will be a maximum of 90°.
> The person in charge of the crew will be placed slightly back to the right of the protected,
the rest of the team may adopt a triangle formation (3+1), a rhombus or square formation
(4+1) and a pentagon formation (5+1), depending on the number of crew members,
covering the front, flanks and back, according to the characteristics of the place and
possible dangerous situations.
> When there are 5 agents, the diamond formation is the most common and convenient,
since it covers the four surveillance sectors, 360° coverage of the protection area is
obtained, however the square formation is positive when necessary reinforce the flanks,
open the front, or any other circumstance.
> These options provide us with greater guarantees of prevention, protection, reaction and
evacuation in the event of possible attacks against the dignitary and his protection team.
FOUR, FIVE OR SIX PROTECTION AGENTS
EVALUATION OF A TRAINING ON FOOT
Teams are evaluated based on four factors.
A. COVERAGE.
It is the ability of the team formation to observe the area around it.
B. PASSAGE.
It is the ability of the team formation to adapt and protect the
executive when entering and exiting vehicles, passing through doors, in
stairs, in elevators, when turning corners, when entering buildings.
C. AGLOMERATIONS.
It is the ability of team building to move the executive through a crowd whether
friendly or hostile.
D. COVERAGE AND EVACUATION .
It is the ability of the team formation to neutralize, cover and evacuate when there is
an attack.
OPERATION IN RECEIVING LINES
OPERATION IN PUBLIC CONTROL
> Access control , of the people who must pass in front of the Personality, always
in coordination with the representative designated by the organization and who
personally knows the guests or attendees. This task will be
carried out outside the room or venue, to prevent possible
incidents that may occur, due to the denial of access to any of the
attendees.
> Entry and exit control , to prevent access by uncontrolled
people and encourage the exit of those who have already had
contact with the protected person.
> Provide an evacuation route , to a safety zone, avoiding it
coinciding with the entry/exit of guests, to situation ■
> During certain public events (ceremonies, rallies, scheduled or
unscheduled activities, etc...), it is common for the
personality, sometimes spontaneously and other times by
default, to address the public to shake the hands of the
attendees, finding ourselves in a situation of maximum
risk, due to the existing physical contact and the impunity
provided by hiding among the crowd of potential
aggressors, which can favor the commission of criminal
actions against the physical integrity of the protected
person.
OPERATION IN PUBLIC CONTROL
> The escorts will be positioned around the
protected taking into account the following
standards of action.

- Permanent observation of the hands and eyes of the public.

- Selective detection of possible suspects.


· People who hide their hands.
· People in a nervous attitude.
· People carrying bags, packages or packages.
· People who want to push themselves into position.
· People who, due to their attitude or clothing, clash with the
rest.

- In the presence of a suspicious individual, the


escorts
PROCEDURES AGAINST A
EMERGENCY
1. RAISE A ALARM.
The agent who first observes the attack must warn out loud, indicating the time position; if
possible type of weapons and/or aggressors.

2. SURROUND THE DIGNATARY .


The agent closest to the aggressor or aggressors will neutralize him, the rest of the agents will
surround the dignitary in order to give him protection.
The team leader will reduce the target of the executive by grabbing him by the waist and
bending his trunk, placing his body on top of him. Under no circumstances will he be knocked
down as it would make the task of evacuating him more difficult.

3. EVACUATE THE DIGNATARY .


Once the target has been reduced, an attempt should be made to move the dignitary to a safer
place out of danger by requesting the movement of the mobile for evacuation.
For no reason does any agent go to the aid of the one who is repelling the attack until the
dignitary is safe, do not forget that the responsibility of the crew is to keep the dignitary alive
and not to capture the aggressors.
DYNAMIC PROTECTION IN VEHICLES

The movement of a person by automobile constitutes a risk factor, mainly


when its use is routine (same itinerary with usual schedules, etc.). We must
not forget that many of the attacks against people
have occurred when they entered their car or were
traveling in it.
VEHICLE SAFETY TECHNIQUES

To obtain the appropriate levels of safety that


allow us to carry out the trips with the
guarantee that the case warrants, it is
essential to have perfect knowledge of vehicle
safety techniques and their practical
application, as well as have cars that conform
to certain technical characteristics. design and
safety.
VEHICLE CHARACTERISTICS

> The vehicles used for the protection of personalities must be


designed and built, considering the different threats that
surround the person being protected, as well as the technical
procedures and weapons used by the aggressor elements,
which will allow us to determine the level of protection
necessary to successfully abort possible attacks or
aggressions .
VEHICLE REGISTRATION

There are two ways to register a vehicle:

1. HORIZONTAL METHOD. 2. VERTICAL


METHOD.
1.METHOD
HORIZONTAL .
A. Front windshield : From the front bumper to the window including the rims.

B. Middle Part : From the windshield glass to the rear window.


: From the rear window to the bumper including the wheels.

C. Back Rear
2. VERTICAL METHOD

T High part From the roof to the door glass


O
b Middle Part From the door windows to the floor of the vehicle.

c. Bottom Wheels, exhaust pipe etc.

HIGH

HALF

LOW
CHARACTERISTICS OF THE
DRIVERS
> A basic element in the protection of dignitaries are the drivers. In most cases, these
personnel lack adequate training in protection, which can be an obstacle to obtaining the
desired security levels.
The main functions of drivers are summarized in:
□ Prevent what may pose a risk to the protected person.
□ Act in the event of possible incidents, applying specific techniques.
□ Inspect the vehicle, for two fundamental reasons:
a) Detect and solve small faults.
b) Detect possible sabotage or intentional abnormal manipulations in the
vehicle.
□ Know and coordinate with the escort the itineraries to follow.
□ Avoid hesitation that may result in immobilization of the vehicle.
□ Apply defensive and offensive security driving techniques.
LOCATION OF AGENTS
SECURITY
INSIDE THE VEHICLE
The location of security agents inside the vehicle is from front to
back and from right to left.
LOCATION OF AGENTS
SECURITY

INSIDE THE VEHICLE

In the main vehicle, the team leader sits next to the driver on the
right side and the dignitary sits in the back seat on the right side.
LOCATION OF AGENTS
SECURITY
INSIDE THE VEHICLE
But it may be the case that the executive only has a bodyguard
driver, in this case he must be placed in the back seat, right side.
SAFETY CAPSULES

> A vehicle and an escort . The escort, in some cases, in addition to his protection
functions, performs driving duties for the main vehicle. In this situation the safety
parameters are reduced to a minimum and as a safety device it seems inadequate, since
the reaction and evacuation capacity is greatly reduced, while the degree of prevention and
protection is slightly maintained.
> One vehicle and two escorts . Driving and safety functions are generally shared. A
greater degree of prevention is obtained, increasing the reaction and evacuation capacity.
> Two vehicles and three escorts . There are different possible
combinations, the most commonly used being that an escort performs
driving duties for the main vehicle and the other two carry out follow-
up with the protection vehicle.
SAFETY CAPSULES
On some occasions an executive or dignitary receives the protection of two or more
vehicles in front and behind, in this case the vehicle in front is called the hare and the
one in the back is called the escort, the distance from the hare to the main vehicle
being 15 to 20 meters. and the main one to the escort one of 5 to 10 meters.
DRIVING TECHNIQUES
□ Driving techniques are based on knowing how to control the speed and
movement of the vehicle, to use them as a defense or attack instrument,
depending on the operating characteristics of the car and the nature of the
emergency.
□ Defensive or evasive driving . Under this name we understand all
maneuvers aimed at avoiding a barricade and obstacle on the road, without
colliding with the vehicles or materials that comprise them.
There are three kinds of defensive maneuvers.
Short return or smuggler
California return or testa-c
□ Offensive Driving

This type of driving consists of taking advantage of the weight, power and speed of a vehicle
to confront an obstacle directly, using the car as an instrument to break down a barricade or
avoid immobilization.
The main offensive maneuvers are:

- Rampage of barricades.
- Barricade draw.
- Lane clogging.
- Lane change.
Spins.
Stops at traffic lights.
VEHICLE CARAVAN

> Caravan is a set of official or private vehicles that for safety reasons circulate in
groups on urban or interurban roads to move a personality from one place to
another.

> The caravans follow a previously established itinerary, which has been studied by
the members of the personal protection team, in order to establish the security
measures that are considered appropriate. To the extent possible, unscheduled
routes should be avoided and the itineraries should be known, both by drivers and
members of the personal protective team.
There are two types of caravan.

□ Formal caravan.
□ Informal caravan.
CASUAL CARAVAN

> They receive this name when the itinerary they travel is known only to the
personality, their collaborators and the personal protective equipment, with the
destination being unknown in some cases.

> This type of caravan is used for regular trips, such as to the
workplace, meetings, restaurants, private events, etc.
Its main characteristics are:
> Use of private vehicles.
> Reserved nature of the itineraries.
> Circulation of vehicles subject to traffic regulations.
, > Need to vary schedules and itineraries,
ensuring confidentiality.
FORMAL CARAVAN
They receive this name when public domain itineraries are used, knowing the point of
departure and destination, for the movement of important dignitaries, within a special security
device, generally of an official nature.

Its main characteristics are:


❖Special deployment of organization and security, with air coverage, security
post and subsoil review.
❖Use of connected optical and acoustic signals (flashlights, sirens, etc.).
❖Circulation of vehicles not subject to traffic regulations to avoid traffic
interruptions during their transfer.
The number of vehicles in a caravan may vary, depending on the level of security and the
resources available, both human and material.
ITINERARIES
□ The study and analysis of itineraries is a fundamental technique to
ensure adequate levels of safety when traveling with motor vehicles.

□ It is based on establishing, after a prior


reconnaissance of the plan and terrain, those
routes that meet the optimal safety conditions
to carry out the transfers, and which basically
consists of.
ITINERARIES
- Establish the main itinerary, from the residence to the office and vice versa, as
well as to the usual places of activities.
- Provide for alternative and emergency itineraries , which will alternate with the
main one at different intervals, as well as various evacuation and escape routes
to safety areas, in situations of danger or imminent risk.
- Preferably use wide roads that allow quick travel (highways, highways, two-way
streets). etc ).
- Know the location of security zones and possible evacuation points (police
stations, healthcare centers), along all the routes to which to evacuate the
protected person, in case of emergency.
- Reduce travel through those points that, due to their characteristics, may pose a
risk situation.
ITINERARIES
In anticipation of any contingency that may arise in the transfer of a personality
and in order to determine possible areas of vulnerability in an itinerary, we will
take into account the following criteria.
Maximum area of vulnerability
Space and time + Vehicle Entry + Acceleration
It is the space and time from when a person leaves the door of their residence,
office or facility, enters the interior of the vehicle, starts moving and reaches a
speed greater than 20 km/h or until they reach the first crossing or intersection.
where an alternative itinerary to follow can be selected.
Vulnerable areas
They are those that cannot be avoided in an itinerary because they are
mandatory passage points and, therefore, susceptible to being chosen, by
criminal elements, to commit attacks against the protected person, in addition to
those places where, due to traffic conditions, and/or the direction of traffic, it
would be easy to isolate the car through a blocking action (ambush). Normally
they will be narrow one-way streets.

> To enhance security in these areas, it is essential to BREAK


THE ROUTINE , that is, modify the departure/entry time slot
substantially, by more or less 15 minutes at least to achieve
adequate security levels .
VULNERABLE POINTS BECAUSE?

HIGH TRAFFIC DENSITY

Explosives

BUS STOPS, CABINS

NTORPECY ING I.
o C.
CROSSING STREETS WITHOUT TRAFFIC
LIGHTS

NARROW STREETS / ZEBRA CROSSINGS

STREET LIGHTS, SEWERS, GARBAGE


CONTAINERS, MAILBOXES
WORKS ON PUBLIC ROADS, VEHICLES IN
ACCIDENTS OR UNDER REPAIR

OTHERS (Mandatory passage points)


Slow circulation / facilitates the attack by sF i
ámcuil l abclo ió qnue d oe daeclcv id eehníc t
eul d oep t ro á r fi pceoa . tones.

Slow traffic and/or stopped vehicles

Aggressors establish observation posts

Slow circulation, accident / breakdown


simulation for armed action, explosives in i

Action armed with firearms by blocking


vehicles.
BASIC INFORMATION OF THE DIGNATARY OR EXECUTIVE
This information is handled confidentially by the Head of Security .

• Description and location of facilities (residence, place(s) of work, others).


• Representative positions at the business, political, social and institutional
level.
• List of main professional or social activities (work, sports, attendance at cultural
events, others).
• People close to the protected person, such as secretaries, drivers, domestic
help, employees, others.
• Vehicles and means of transportation commonly used.
• Current security devices (human resources, technical means, operational
protection procedures).
• Physical and identification characteristics of the protected person, inclusion of
fingerprint record, signature record and manuscript file. Personal data sheet.
• Medical history , with expression of treatments and medication, where
applicable, and list of doctors.
MAIN PROTECTION CONSIDERATIONS

PROTECTION
COMPREHENSIVE

Instead of
Job

VIP

Activity Displacements
Social on foot or by

vehicles
MAIN PROTECTION CONSIDERATIONS
HOME
It emerges as a target for possible actions for two basic reasons .
- The home is the center of the private activity of the manager and his family.

- It is an easily located point and its occupants constitute a vulnerable target.


■ Most of the usual activities are carried out from the residence; The manager must leave and
re-enter, the children must go to school and return after school, etc... The stability that the
home represents allows criminals to determine the main movements and activities of the
residents, as well as the design and construction characteristics of the building, which will
allow them to evaluate the time and place of maximum vulnerability.

Essentially the aggressor will evaluate residential vulnerability based on the following
factors.

- Situation, type of housing, residents and domestic service, habits, etc.


- Security of the building and surroundings.
DISPLACEMENTS

- Normally these are carried out in motor vehicles, except for certain trips in
which, for professional or private reasons, other means of transport are used,
usually the plane.
- The vehicle and its movements emerge as a target for several reasons.

- It constitutes an easy target for attack.


- The use of the vehicle is routine.
- When the vehicle is used, it is isolated from the safety means, except for those of the
protective equipment.
- The mobility and frequent use of the vehicle provides aggressors with a number of
options for location, modality of action and time of attack.
- The attackers will try to outnumber the occupants of the vehicle.
- A car is easy to follow, if you have a sufficient number of people, vehicles and
communications.
ANALYSIS OF RISKS AGAINST PEOPLE

> It is said that risk exists when its control is unknown.


> A useful definition of a security problem requires that three aspects be
recognized and evaluated:

□ Risk Identification: The types of threat and risk that affect people who
must be protected.
□ Risk assessment: The probability that these risks will become real cases
of threats.
□ Impact in the event of a crisis: The impact or effect on the people under
our protection and responsibility.

The relationship between the three aspects listed will be the fundamental
element for the adoption of active protection and personal security measures for
our executives.
RISKS AGAINST PEOPLE

V ATTACKS.
'KIDNAPPINGS.
{ ASSAULTS AND ARMED ROBBERIES.
V AGGRESSIONS.
V EXTORTIONS.
V THREATS.
V ACCIDENTS.
{ ACTIONS PRODUCED BY NATURE.
{ ALTERATIONS OF PUBLIC ORDER.
V MINOR INCIDENTS
ATTACKS ON PEOPLE
They are normally motivated by direct or indirect causes, related to the protected
person, they may be of a terrorist or criminal nature.

With a firearm .
Armed action when leaving/entering the home, office and traveling
between different workplaces and daily activities.
Through explosive devices.
o Sending correspondence/packages with explosive devices.
o Placing an explosive device in facilities.
o Attach explosive device to the vehicle.
o Attacks with explosive devices, on travel itinerary.
SAFETY DEVICES

The purpose of the personal protective equipment is to guarantee a level of


security around the dignitary in the different places where he carries out his
professional, political and private activities.

What will be involved is ensuring maximum performance and


productivity of operational protection personnel, preventing
risks, whether obvious or covert.
HUMAN RESOURCES

Personal protective equipment should basically consist of:


- Dynamic protection personnel.
- Static protection personnel.
- Advance and counter surveillance personnel.
SERVICE COVERAGE
The types of coverage can be structured as follows.
Full coverage : 24 hours a day, every day of the week.
Daily coverage : 12 to 16 hours every day of the week.
Labor coverage : 8 a.m. to 4 p.m. on weekdays.
Reduced coverage : periods less than 8 hours, weekdays. Temporary
coverage : on specific, previously determined trips.
Sporadic coverage : during time and space for a specific situation.
VEHICLES
> Normally we differentiate between two types of vehicles,
depending on their use by the personality or the escort team.

□ Main vehicle.
□ Protection or escort vehicle.

> Other types of vehicles that can be used by


the aforementioned services are
motorcycles, performing different functions.

Reaction.
□ Advanced.
□ Caravan guide
COMMUNICATION EQUIPMENT
* Regardless of the availability of mobile telephone equipment, it is necessary to have a radio
communication network basically composed of a base station as a control and operations
center and portable communication equipment; Telephone interception and call tracking
equipment must also be available.

❖ In order to establish secure communications, protection members can be


provided with Phonak model communication systems (wireless inductor
receiver, induction coil, mini microphone and push-button microphone).
WEAPONS AND SPECIAL EQUIPMENT
> Taking into account the legal aspects, in terms of legislation on private security services
and weapons regulations, it is technically considered necessary to provide the
components of escort services with firearms that meet the following characteristics:
□ Easy portability and handling.
□ Functional and accessible mechanics.
□ Security mechanisms.
□ Firepower.
□ Double action mechanism, in short weapons.
> Other possible accessories , in addition to the regulatory weapon
and its holster, are bulletproof vests, their use being recommended in
high-risk situations. There is a wide variety of models and levels of
protection on the market. It is also convenient to have portable explosive detection
equipment. , distinctive to be used by the different components of the protection circles.
COORDINATION OF SERVICES
> Personal security encompasses dynamic protection and static protection, with
coordination between the different components that make up both services being of vital
importance.

> To promote the coordination of these two services, it is necessary to organize a


communications and password system that allows us to ensure the confidentiality of the
messages to be transmitted. To do this, we must proceed as follows.
□ Each protective equipment (dynamic and static) will have an identification code.
□ The places to visit are grouped by activity zones and are assigned a coded key.
□ Establish different codes for regular and emergency situations, such as entrances,
exits, arrival at other points, etc.
□ Define an agreed language.
□ As a general precautionary measure, both the callsigns and the keys used must be
updated or modified periodically.
DIFFERENCES BETWEEN A LONE ENEMY AND AN ENEMY
MEMBER OF AN ORGANIZATION
ENEMY MEMBER
ISSUE LONE ENEMY OF A
ORGANIZATION

Compilation of He has support, means and


information for the Limited, you will have to
resources, he will remain
operation. stay close to your enemy
close to the objective for a
for a long time. short time.

Way of acting. Unknown.


There are characteristics
based on experience.

Evidence of planning and Minimal possibility of Greater possibility of


intention. exposure. exposure.

Planning. Individual.
You can involve others.

Support for the Does not have. Has.


operation.

Reasons for carrying out Identification with an Identification with an


the operation. individual. organization.
WAYS TO GET INFORMATION FROM THE ENEMY

1. OBSERVATION:
a. open
b. Covert
c. Camouflaged.
2. RECOGNITION ROUNDS.
3. FOLLOW-UP.
4. COLLECTION OF INFORMATION THROUGH A SOURCE.
5. BRIBES.
6. INFILTRATION OF A SPY WITHIN THE ORGANIZATION.
7. PHYSICAL LISTENING FROM WITHIN THE ORGANIZATION.
8. LISTEN VIA PHONE.
9. USE OF ELECTRONIC MEDIA.
FIVE LINES OF SAFETY FOR
PROTECTION
OF EXECUTIVES
1st LINE:

- Apply common sense to all things


- Keep a low profile
- Don't advertise
- Politics of silence

2nd LINE:
- Security in offices
- Home security (doors)
electrical,
alarms, bars, gates, cctv.)
- Safety of your vehicle
FIVE LINES OF SAFETY FOR
PROTECTION
OF EXECUTIVES

3rd LINE:

- Car with Driver / Bodyguard (2 functions)


4TH LINE:

- Car with Driver and Bodyguard (2 techniques)


5th LINE:

- Car with Driver and Bodyguard with 1 or 2 Security cars (Capsule).


THE SAFETY DRIVER

PROFILE:

• PHYSICALLY AND PSYCHOLOGICALLY FIT


• Proper education
• Manners
• Security awareness
• Discretion at every test
THE SAFETY DRIVER

PERSONAL COMPETENCES AND


ABILITIES
The safety driver is required to have:
• CONDUCTIVE CAPACITY

• Training

• Experience

• Capacity and firmness to face

emergencies
THE SAFETY DRIVER

For excellence, foolproof discretion :

• He is “deaf”, “blind” and “dumb”.


• He never “heard anything”
• He never “saw anything”
• He never “talks about the VIP and his issues.”
THE SAFETY DRIVER
PROTECTION OF CONFIDENTIAL INFORMATION OF THE VIP AND
THE INSTITUTION:
• Who wants the information? Identify the threat.

• How vulnerable are we? Do we protect confidential or critical


information?
• How likely is it to happen? Does anyone “give us comments” or “give us
information”? Constantly or occasionally? A? Different people? In different
ways?
• What impact would it have if you provide confidential information? Do
you know the serious consequences for you? For the VIP? For the
institution?
DRIVING IN VIP SAFETY

CONCEPT:

They are the attitudes, preventive measures, procedures and


reactions that every driver must have in order to
contribute to the safety of a VIP.
DRIVING IN VIP SAFETY

KEY FACTORS:

• DRIVER
• THE VEHICLE, and
• THE STRATEGY
DRIVING IN VIP SAFETY

KEY FACTORS:

DRIVER
Key element par excellence, success or failure in safety driving
depends on it

• Skilled in driving
• Knowledge of your vehicle
• Continuous training
• Experience
• Decision and firmness of character in emergency situations
DRIVING IN VIP SAFETY

KEY FACTORS:
THE VEHICLE
• Power
• Maneuverability
• Armor
DRIVING IN VIP SAFETY
KEY FACTORS:

THE STRATEGY

Those who commit attacks are based on:

• The surprise
• Detailed knowledge of the scenario
• Speed and numerical superiority
• Domain and/or control of the situation

In this sense, the strategy must be aimed at controlling, overcoming


or saving the deadly tactics of criminals, terrorists, hostile groups or
other people.
DRIVING IN VIP SAFETY

PREVENTIVE SAFETY MEASURES:

• OBSERVATION AND SURVEILLANCE


• INFORM
• COMMUNICATION WITH THE SECURITY AND/OR VIP TEAM
• CARE OF THE VEHICLE AND PERMANENT
REVIEW
• ROUTE KNOWLEDGE
• FIRST AID
• EMERGENCY / CONTINGENCY PLAN
DRIVING IN VIP SAFETY
EVASIVE OR DEFENSIVE DRIVING

CONCEPT:

ALL THOSE MANEUVERS INTENDED TO AVOID


BARRICADES OR OBSTACLES ON THE ROADS, WITHOUT
COLLIDING WITH A VEHICLE OR OTHER OBJECTS.
DRIVING IN VIP SAFETY

OFFENSIVE DRIVING

CONCEPT :

THE PHILOSOPHY OF OFFENSIVE DRIVING CONSISTS OF


USING THE VEHICLE AS A WEAPON, TAKING ADVANTAGE
OF ITS WEIGHT, POWER AND SPEED TO FACE AN ATTACK,
BREAK UP A BARRICADE OR AVOID AN IMMOBILIZATION,
TENDING TO COMMIT AN ATTACK.
AMBUSHES

It is the favorite tactic to exploit surprise; Therefore, the defense


against vehicle ambushes must concern us just as much as the
defense against movements on foot.

Preventive protection is better than reactive protection, however,


even taking into account "It is preferable to anticipate", we must be
prepared to react against any ambush or subversive attack or
attack by common criminals.
TYPES OF AMBUSHES

Ambushes against vehicles are of two types:

1. Mobile Ambush (attack from a moving vehicle).


2. Fixed ambush (attack from a fixed position).
BASIC CRITERIA IN VIP PROTECTION
□ The higher the level of understanding and agreement between
the protective staff and the VIP, the smaller the “cracks” in
Security will be.
□ There must be cooperation from the environment at the established
security level.
□ An attempt should be made to adapt the protection system to the
dignitary's way of life.
□ Possible reactions to various situations should be tried and agreed
upon in advance, mainly in the prevention phase. (Neutralization of
interference when carrying out Protection).
□ The limits of the “Hidden Risk” must be defined.
BASIC CONSIDERATIONS TO BE MADE
TAKE INTO ACCOUNT FOR PLANNING
A MOVEMENT IN VIP SECURITY

1. Is the movement formal or informal?

2. Can you predict the time or the route?

3. Is the route the shortest possible?

4. Provides maximum executive exposure

motion?

5. Is there an alternate route available?


BASIC CONSIDERATIONS TO BE MADE
TAKE INTO ACCOUNT FOR PLANNING
A MOVEMENT IN VIP SECURITY
6. Where are the critical points?

7. What is the best route for evacuation in case of emergency?

8. Is there a safe area available?

9. Is it possible that the lead car can enter the safe area?

10. Where is the nearest medical facility and what is the best route to it?

Are there dangerous physical sites such as areas, floors, or floors in poor
11 condition, etc.?
.
BASIC CONSIDERATIONS TO BE MADE
TAKE INTO ACCOUNT FOR PLANNING
A MOVEMENT IN VIP SECURITY

12. What type of protective formation or movement will be most appropriate


for the movement?

13. Will the support of base personnel be necessary?

14. Will any coordination with the jurisdiction's police element be needed?

15. Number, type and location of protection

16. Is there direct communication between the escort and the command
post?
17.
Has the protection escort been aware of formations, communications,
evacuation routes and safe havens?
BASIC CONSIDERATIONS TO TAKE INTO ACCOUNT
WHEN PLANNING A MOVEMENT IN VIP SECURITY

18 Who is the coordination agent between the command


post and the escort?

19 How many people accompany the executive?

20 GOOD LUCK

You might also like