Close Protection Training Manual
Close Protection Training Manual
The Private Security Industry Act 2001 outlines a system for the statutory regulation of
the private security industry.
The Act is broken down into a number of Sections and two Schedules:
The text below summarises sections 1 and 2 of the Private Security Industry Act 2001.
In addition:
The SIA can do those things it considers necessary or helpful in discharging its
functions.
The SIA can make proposals to the Secretary of State to modify any provision
contained in the Act, and to undertake, arrange or support research relating
to the provision of security services.
The SIA must comply with directions, from the Secretary of State and must
provide any information that the Secretary of State requests. The Secretary of
State must consult the SIA before giving any directions.
The text below summarises sections 3-6 of the Private Security Industry Act 2001.
These clauses create the offence of engaging in conduct for which a licence is
required when not in possession of the appropriate licence. The penalty on
conviction in a magistrates' court, is up to six months' imprisonment or a fine of up to
£5,000, or both.
The current designated sectors or activities that must be covered by a licence are
as follows:
manned guarding, which includes:
cash and valuables in transit - under contract
close protection - under contract
door supervisors - under contract and in-house
public space surveillance (CCTV) - under contract
security guarding - under contract
vehicle immobilising - under contract and in-house
key holding - under contract
The text below summarises sections 7-12 of the Private Security Industry Act 2001.
Criteria
The SIA is required to prepare and publish the criteria that it will apply in reaching
decisions on granting, modifying or revoking licences.
In practice, this will be criteria relating to criminality and competency for each
designated sector.
Licences
The SIA can refuse to grant a licence until it is satisfied about the identity of the
applicant; until any additional information requested of the applicant has been
provided; and until any further enquiries undertaken by the SIA have been
completed.
Applicants for licences are required to pay the SIA a fee of an amount prescribed
by the Secretary of State.
A licence is valid for a period of three years, although the SIA is empowered to
modify, revoke or suspend a licence or any conditions attached to it.
Public Register
The text below summarises section 13 of the Private Security Industry Act 2001.
The Secretary of State may make an order allowing a local authority to carry out the
functions of the SIA with regard to the licensing of door staff.
The text below summarises sections 14-18 of the Private Security Industry Act 2001.
The Act provides for a voluntary scheme but also provides power to convert it into a
compulsory one.
The text below summarises sections 19-22 of the Private Security Industry Act 2001.
The SIA must publish guidance on the manner in which persons authorised with the
power of entry and inspection should exercise it and the manner in which they
should conduct themselves.
This guidance may be revised from time to time. The SIA must publish the initial
guidance and any revisions to it in a way that will bring it to the attention of those
affected by it.
The Act amends the Police Act 1997 to permit the SIA to obtain an enhanced
criminal record certificate for anyone applying to be licensed as a door supervisor.
Please note that this was repealed by the Criminal Justice Act 2003.
False Information
It is made an offence for anyone to knowingly or recklessly make a false statement
to the SIA in connection with the exercise of its functions.
The text below summarises sections 23-26 of the Private Security Industry Act 2001.
Interpretation
The terms used in the Act are defined.
The text below summarises Schedule 1 of the Private Security Industry Act 2001.
This Schedule contains detailed provisions about the constitution of the Security
Industry Authority, including:
This Schedule also extends to the SIA the provisions of legislation relating to public
records, the Parliamentary Commissioner, the payment of pensions, disqualification
for election to Parliament or the Northern Ireland Assembly and freedom of
information.
The text below summarises Schedule 2 of the Private Security Industry Act 2001.
This Schedule describes the activities that are subject to control under the Act. Part I
relates to the controlled activities of security operatives. Part II provides for additional
controls in relation to door supervisors and vehicle immobilisers.
Chapter 1
The SIA (UK Regulatory Authority) defines a Close Protection Officer as someone
whose role is: "to establish and maintain a safe working environment in which a
Principal can live and work whilst continuously minimizing risk".
OBJECTIVES
PROTOCOL
The system of rules, dress and acceptable behaviour that people should follow.
Cleanliness.
Well-groomed.
Nails clean and trimmed.
Clean-shaven.
Haircut.
Avoid strong smells i.e., aftershaves & food.
No smoking while on duty. Be mindful of smell on clothes when on duty.
No chewing gum.
Dress and Conduct
As a Close Protection Operative, you must ensure your presentation is clean and
clothes are pressed.
Take into account the following in order to present a professional image in all
circumstances:
Principal / Entourage
The Itinerary
The Environment
Covert or Overt
Invest in a decent suit, however, if you are buying an off the rack suit ensure that it’s
a good fit especially the shoulders. Opt for a charcoal or grey colour suit rather than
black unless its evening wear. Trousers should cover the top of the shoe and parts of
the laces. Consider weapons (not the UK) or communications equipment.
You cannot go wrong with a white shirt (keep a spare i.e., in the boot of a car, ops
room, hotel, etc). Sleeve cuffs to be exposed approximately half an in inch. A tie
should be darker than your shirt and should just reach the waistband of your trousers
or slightly shorter.
Always wear a belt which should be fairly thin and the same colour as your shoes. If
carrying equipment wear dark-coloured bracers.
You should endeavour to have a mixture of clothing available to you for different
occasions:
Specialist – Tuxedo.
Business casual – Smart dress without tie (keep tie with you).
Smart casual – Trousers, shirt, jumper over the shirt, shoes.
Casual – Smart jeans, shirt, polo shirt, trainers or shoes.
Physical training kit/sportswear – Tracksuit, shorts, t-shirt, sweatshirt, skiing outfit.
Overalls – for searching vehicles, venue search, etc.
Often you will be required to blend into your environment in order to keep a low
profile. For example:-
The Principal is dressed casually therefore you will need to dress casually.
You are working with your Principal in the city in an area of executive business
people, therefore, will need to dress accordingly.
Communication skills.
Listening skills.
Negotiation skills.
Problem-solving.
Decision making.
Assertiveness.
Etiquette.
In UK law there is a duty of confidentiality that has been established by Statute and
continually developed by Case law. A duty of confidentiality can arise without an
explicit statement of its kind, i.e. a client has the right to assume you are 100%
trustworthy and will not discuss their private conversations with anyone else. This is an
implied and legally binding confidentiality agreement simply because you are
employed in your role.
Diplomacy
What is Law?
Law is a code that regulates the behaviour of members of society and affects
almost everything we do from buying a house to getting a divorce.
Whist is Legislation?
The legislation is a law enacted by a legislative body or the act of making laws.
During employment as a Close Protection Operative, you may have to make a legal
decision before or during the execution of duty. These legal decisions will not only be
made of oneself but also on behalf of the protective team and the Principal. As a
Close Protection Operative, you have no more powers than any other ordinary
person by acting lawfully i.e. Any person may arrest without warrant any person who
is in the act of committing an arrestable offence or has reasonable grounds for
suspecting to be committing such an offence.
Civil offence.
No power of arrest.
Power of eviction.
Murder.
Rape.
Sexual Assault.
Assault (ABH).
Assault (GBH).
Assault (GBH with Intent).
Possession of a firearm in a public place.
Possession of a firearm with intent to endanger life.
Possession of a firearm or imitation firearm with intent to cause fear of violence.
Drugs and Controlled Substances.
Supplying Drugs.
Possession of Drugs.
Possession with intent to supply.
Offensive Weapons.
Possession of bladed or sharply pointed articles.
Theft.
Fraud.
Robber.
Burglary.
Aggravated Burglary.
Criminal Damage.
Damage with intent to endanger life.
Aggravated Damage.
Threats to Damage.
Use of Force
Rules of Self-Defence
If any person has an honest belief that he or she is in imminent danger, then he may
use such force as is reasonable and necessary to avert that danger.
Pre-Emptive Strike
Although a person who acts in self-defence is normally being attacked, the defence
is not limited to this situation, since it has been recognized that there may be
situations in which it will be justified to use reasonable force by way of pre-emptive
action against an apprehended attack.
It is very easy to become familiar with things in our everyday lives and therefore you
become complacent and if danger were to strike you would be caught off guard.
Limit Information.
Be constantly aware.
Avoid routine.
Maintain your security procedures.
Exercise initiative and common sense.
Limiting Information - Need to Know Basis.
All information that comes via Principal Profiling (See Threat Assessment)
All business details.
All security plans including floor plans and maps.
Be Constantly Aware
Keep within the "Yellow" area of Jeff Cooper's Colour Chart. Be constantly aware of
what is going on in your surroundings.
The Cooper Colour Codes is not a system for describing levels of potential danger,
but rather a technique to enable a law-abiding citizen to overcome a natural
reluctance to use lawful deadly force against another. Jeff Cooper
Avoid Routine
Routines fall under the category of patterns and habits. It is these patterns and
habits that can give the hostile information needed to plan an attack. For example:-
Leaving for the office every day at the same time taking the same route.
A meeting scheduled at the same time, same place, same day every week.
A CP team member leaving his home heading to the Principal's residence at
the same time using the same route every day.
The size and members making up the Close Protection team depends on many
factors;-
The Principal.
The level of threat.
The environment in which protection will be offered.
Travel requirements.
The cost factor and available funding.
The different roles performed by Close Protection Officers are explained below.
The Team Leader is primarily a manager usually carried out by the most experienced
team member. Responsible for;-
The PPO or BG is a member of the team who has been allocated the responsibility
for the immediate protection of the Principal at all times and will escort the Principal
whenever possible. Their main role is to provide “cover and evacuation” of the
Principal when threatened.
Here the PPO / BG will be the initial communications link between the Principal, the
Team Leader (TL) and the rest of the CP team who will relay any immediate changes
to the itinerary or issues that may affect the security of the Principal.
(There may be times and / or places when due to the venue and existing security
the PPO or BG and members of the Personal Escort Section will not be allowed,
remember to remain polite and flexible).
The PES provides the next layer of protection around the Principal and PPO / BG.
They are tasked with assisting the PPO / BG, specifically dealing with any threat
directly, continued surveillance for any potential threat and to assist the PPO / BG in
the evacuation of the Principal.
The planning of routes to, from and between venues, where possible ensuring the
safety of the route prior to the Principal using it.
The planning of secondary and escape routes.
On route surveillance.
Checking and assessing venues.
Members of the RST would ordinarily be responsible for searching and securing the
Principal’s home, office and residences. Roles and responsibilities include:-
The 2IC is a team leader who will be au fait with all the Close Protection Team
Leader's duties and responsibilities.
Security Driver
The security driver is responsible for not driving the Principal from A to B but also the
security of the vehicle. The driver must be trained to very high standards in
advanced, defensive, offensive and anti-ambush techniques under highly stressed
situations.
It is also essential that the driver works well and has carried out drills with the Close
Protection team.
Surveillance Operative
A surveillance operative has the task of maintaining control of subjects via covert
observation and gathering quality intelligence in order to assist in the provisions of
security procedures.
Chapter 2
THREAT ASSESSMENT
Fire.
Theft.
Accidents.
Embarrassment.
Discretisation.
Health problems.
Dangerous weather conditions.
The threat assessment will need to include a vast amount of background information
including and not limited to:-
Private and sensitive information is also required, however, often the Principal is
reluctant to provide such information, therefore, it might be a case of learning on
the job and adding the information at a later date. Such information may include
extramarital affairs, drug or drinking habits and gambling addictions.
CLEAR
A Threat LOGICAL
Assessment RELEVANT
Must Be ACCURATE
ONGOING
GATHERING INFORMATION
There are several places where information for threat assessments can be gathered
including:-
• The Principal, the Principal’s family, the client, advisors and staff.
• Police, Security Services, Military Intelligence and Embassies.
• Local Information and open source information (Press, Media, Internet
etc.)
As stated earlier some of the information required of our Principal will be given and
some information will be gained as the relationship with the Principal builds.
Principal Profiling:-
THREATS
Direct Threats Specifically targets the Principal, his / her family, associates
and the security team.
Indirect Threats Do not specifically target the Principal but can cause harm
or embarrassment etc., for simply being in the wrong place
at the wrong time.
Criminal Threats Money and possessions are targeted by a thief or
opportunists.
Miscellaneous Illnesses, natural disasters, motor accidents/breakdowns etc.
Threats
There is never 'Not a Threat', as attacks occur from simply being in the wrong place
at the wrong time!
The Principals profile and the perceived threat will determine the level of protection
required. By having an accurate assessment of the threat the Close Protection team
can provide a level of protection which can be increased or decreased depending
on the situation. Unfortunately, a “trade-off” between what the Principal is happy
with, the financial resources and the potential threat is common.
How much of a trade-off a Principal will have to make between protection and
lifestyle. The higher the level of threat the more the Principal’s lifestyle will be
compromised. The threat assessment must be able to establish which risks can be
eliminated, which can be lowered and which will remain constant. Some of these
risks will be inherent to the Principal while others to a specific place or event. For
example, the risks associated with being very wealthy and powerful are inherent to
the Principal. Risks that occur when the Principal travels to a place controlled by
business rivals are inherent to that place.
Note: It is necessary to recognise that there are problems with determining the
appropriate threat level as well as implementing procedures required. For instance;
a Cat 2 client can only afford Cat 3 protection.
Once a threat has been recognised the following questions should be addressed:
Many attackers and near-lethal approaches craved attention and notoriety, while
others acted to bring attention to a particular problem. Some assailants of public
officials and figures were consumed with seeking revenge for perceived injuries or
harm.
A few attacked, or nearly attacked public officials or figures in hopes of being killed
by law enforcement or being removed from society by being incarcerated.
Several believed that assassinating their target was a way to save the world. Others
responded to beliefs or imagined voices that they felt ordered to attack a national
leader. Some subjects approached a celebrity with a weapon to try to force the
target into a special relationship.
Finally, a few attacked public officials or figures for money, either because they
were paid to kill the target or as part of an attempt to secure ransom money…….
ECSP Examination
Is there history?
Have the attacked before?
How sophisticated is the attacker?
What resources have the attacker?
Potential Attackers / Threats - Why and how but not limited to:-
From the assessment, you have established that there is a threat and now ask
yourself:-
Motivation Yes / No
Does the attacker have The Capability Yes / No
The Opportunity Yes / No
If the answer is yes to the three questions then there is a real danger of some kind of
attack therefore your job becomes more difficult. However, you MUST prevent an
attacker’s opportunity by implementing security measures.
Checklist X
Principal’s Profile X Security
Principal’s Itinerary, places, venues, trips. X Measures and
Details / Plans of the Principal's Residence & Office. X Actions On
Details of potential attacks, who, why, when. X
The purpose of the Threat Assessment is to identify what possible threats you are up
against, including those that are indirect threats, so that you can plan effective
measures to secure a safe environment.
Scenario:
The Principal has an important board meeting at the organisations offices. The
meeting has been publicised so there will be a crowd of environmental activists
outside the office.
The IED is the most popular method of attack by terrorists worldwide since the
information regarding the construction of basic IEDs can be found on the
internet and the materials needed are sold over the counter in most places.
The size of an IED can range from as small as a cigarette packet to a large
truck as well as being disguised as virtually anything.
The success rate is high, they attract publicity and there is no need for close
contact as the attacker can be hundreds of miles away.
High explosives such as dynamite, RDX, Gelatine, C-4, Semtex and PETN
undergo a rapid chemical change upon detonation. This change is from a
solid or liquid to a gaseous state. The gas rapidly moves away from the point
of detonation at speeds of up to 26,500fps as in the case of C-4. The moving
gas is the force that damages or destroys everything in its path.
Low explosives burn quickly instead of exploding such as in gun powder. The
burn rates of low explosives are usually under 3000fps. Low explosives are
usually sensitive to heat, shock and friction and less stable than high
explosives.
Improvised Explosive Devices (IED’s) commonly use but do not always require
the following:
Timer
Watch batteries.
Flat batteries used in novelty birthday cards.
Solar powered cells.
Car batteries.
Explosives are fairly easy to come by if the right resources are available. For
example, due to the lack of security at quarries and mines especially from
some eastern bloc countries that supports certain terrorist organisations.
Homemade explosives such as ANFO and CO-OP mix are easy to produce
and are very effective.
Incendiary mixes are usually all homemade from simple household items such
as weed killer and sugar. These devices can be as small as a cigarette
packet.
TYPES OF BOMB
From recent events we have seen how devastating portable devices can be
and all it takes is for the attacker to have knowledge of where and when
your Principal is going to be at a certain location.
Car Bombs
Car bombs have proven to be one of the most harmful kinds of IED for
civilians causing as average of 30 casualties per incident.
These types of bombs are known as vehicle-borne improvised explosive
devices (VBIED)
In the 1980’s the Colombian drug lord Pablo Escobar used VBIED’s extensively
against government forces ad populated centres in Columbian and Latin
America. The most notable was the DAS Building bombing which killed 63
and injured approximately 1000 people.
Roadside Bombs
Roadside bombs, on the other hand, have a small payload in comparison –
causing an average of six casualties per incident. They are also less targeted
and less likely to be used in populated areas. Unlike, other IED types, the
roadside bomb causes a greater percentage of armed actor and security
personnel casualties. 84% of casualties from car bombs were civilians,
compared to 55% from roadside bombs. In total, roadside bombs accounted
for 6% of civilian casualties from IEDs, but 22% of armed actor casualties.
Roadside bombs were recorded in 29 countries and territories around the
globe.
Letter Bomb
A letter bomb, parcel bomb, mail bomb or package bomb is an IED sent via
the postal service or via a courier and designed to assassinate or injure the
recipient when opened.
Suicide Bomb
A suicide bomb is when the attacker accepts their death as a direct reslt of
the method used to harm, damage or kill targets.
Suicide bombings represented only 28% of all IED incidents recorded, but
they accounted for 66% of all deaths and injuries from IED attacks. The
countries worst affected by suicide bombings last year were Iraq, Syria,
Afghanistan, Turkey and Pakistan. 30% of all incidents recorded were in Iraq.
70% of all recorded suicide incidents took place in populated areas. In these
attacks around 90% of those killed and injured were civilians. Suicide attacks
in populated areas caused an average of 51 civilian deaths and injuries per
incident. This means suicide bombings are the most injurious of all IED types
and, indeed, all explosive weapon types.
Pipe Bombs
Pipe bombs are metal tubes filled with some type of explosives and mixed
with nuts, bolts, and nails. These devises can be very portable, easily
concealed and very effective.
Drone Bomb
5m check:
20m check:
DO NOT:
touch an IED
cut any wires
Confirm
Clear
Cordon
Cordoned off the area ensuring that no-one can approach the area
until it is deemed safe.
Minimum cordon distances:-
100m - Briefcase Sized Devices.
200m - Large items up to motor vehicles.
400m - Vans and heavy goods vehicles (HGV’s).
Control
Most bomb threats are made over the phone and the overwhelming majority
are hoaxes, often the work of malicious jokers, although terrorists do make
hoax calls with the intent of causing alarm and disruption. Any hoax is a crime
and must be reported to the police.
Evacuation Plan
Depending on the size and location of the premises, the plans for evacuating
should confirm both the circumstances and arrangements for conducting
either a full evacuation, partial evacuation or evacuation to an internal safe
area such as a protected safe room.
Whatever the circumstances, tell the Police what action you are taking as
soon as possible.
The morning after the IRA bomb attack at the Grand Hotel in Brighton.
TERRORISM
The threat from terrorism remains both real and serious with attacks taking
place at any time without warning and directly or indirectly affecting
organisations
Acts of terrorism vary in terms of scale and purpose. Some merely inflict
superficial damage, some to cause public distress, some to draw attention to
a particular cause and some carry more malicious intent.
The most significant threat comes from international terrorism and its stated
ambitions to mount ‘high impact’ attacks that combine mass casualties with
substantial disruption to key services such as energy, transport and
communications.
Businesses face a range of other threats that possess the potential to cause
significant disruption such as:-
Activist groups driven by political or social issues.
Organised crime.
Foreign intelligence agencies looking to advance domestic interests.
Competitors seeking a commercial edge.
Amateur hacker showcasing their skills.
Staff members, present or former, with a score to settle or opportunity
they couldn't resist, can present a serious risk to an organisation.
Terrorist Tactics
Terrorist tactics tend to favour attacks that exploit vulnerabilities and avoid
effective counter-measures. These terrorist groups have the potential to make
use of different types of terrorism tactics depending on the circumstances
and the likelihood of their success. These include:
Shootings
Hijackings
Kidnappings
Bombings
Suicide Attacks
June 2017, London Bridge attack, was an Islamic terrorist attack in London,
United Kingdom. Whereby a van left the road and struck several pedestrians
on London Bridge. After the van crashed, its three occupants ran to the
nearby Burra Market area and began stabbing people by the local
restaurants and pubs. Eight people were killed and 48 were injured, including
four unarmed police officers who attempted to stop the assailants. The three
attackers, who wore fake explosive vests, were later shot dead by police. The
incident came less than three months after five people were killed in a similar
vehicle-ramming attack in Westminster.
Case Study #2 - Brusthom Ziamani
Brusthom Ziamani, 19, was carrying a rucksack containing a 12-inch knife and
a hammer, when he was arrested on a street in East London in August 2014.
The Old Bailey heard he idolised the killers of Fusilier Lee Rigby and had
researched the location of Army cadet bases in South-East London. Mr
Ziamani, of Camberwell in South-East London, pleaded not guilty. Jurors
heard Mr Ziamani had converted to Islam in early 2014 and his arrest came
after he showed his ex-girlfriend the weapons, described Fusilier Rigby’s killer
Michael Adebolajo as a “legend”, and told her he would “kill soldiers”.
The world knew him as “Jihadi John”, the masked man with a British accent
who beheaded several hostages held by Daesh and who taunted audiences
in videos circulated widely online. But his real name was Mohammed Emwazi,
a Briton from a well-to-do family who grew up in West London and graduated
from college with a degree in computer programming. He was believed to
have travelled to Syria around 2012 and to have later joined Daesh.
The security advance party are assigned to move ahead of the Principal and
close protection team to ensure no problems will be encountered along the
route, at a venue, a meeting place, or at the Principal’s residence.
Advance security is essential in all security operations and can be carried out
either covertly or overtly.
When planning an operation the Security Advance Party (SAP) will travel the
planned routes to all locations that the Principal has planned, carry out threat
assessments of all potential threats that might occur, plans on how to avoid
them and if necessary counter them.
Where finances and manpower permits and the threat level dictates the SAP
team will go ahead of the Principal and security team by 10 to 20 minutes to
check the route and final destination. The SAP can then set up surveillance
before the Principals arrival. If any threats or other problems are seen the SAP
team leader will inform the PES and/or the BG enabling them to take the
alternative route or head for safety.
ROUTE RECONNIASANCE
Recces and threat assessments must be carried out for every journey.
We can break our route reconnaissance down into four phases.
Map Study - ensure maps are up to date. Pick the fastest route with
the least amount of vulnerable points. Use a route planner (mobile
phone) to check for distance/times, delays and roadworks.
Use Google maps for aerial views.
Alternative routes.
Phase 4 – Planning
The planning phase will consist of all the fine details including the route
threat assessment - vulnerable points, escape routes and details of
emergency services and safe houses along the routes.
.
Don’t Be An Easy Target
Discourage your Principal from establishing a routine that will make them an
easy target. When studying assassinations and kidnappings it becomes
obvious that the terrorists/abductors had observed the movements of the
target knowing where he/she would be at a certain time.
(See Hostile Surveillance)
Varying routines will not only make it harder for some type of ambush to be
orchestrated but will also ensure that the protective team maintain a high
level of alertness.
The route recce is a key element in all journeys being mindful of anything that
may have an effect on the journey including and not limited to:-
Road works.
Diversions, one-way streets and dead ends.
Traffic lights.
Built-up areas, tall buildings.
Roundabouts and junctions.
Bridges, crossings and tunnels.
High crime and lawless areas.
Radio black spots and checkpoints.
Safe-houses (Police stations, Embassies) and Hospitals.
Put yourself in the shoes of the attacker and establish if areas especially
choke points, could be used as attack sites. (Chokepoints = one way systems,
bridges, tunnels, railways crossings).
Consider the following:-
Considerations:-
What type of hospital is it and what emergencies can they deal with.
Choke areas.
Possible ambush / vulnerable areas.
Emergency response times from the hospital and police station.
Alternative and escape routes.
Radio blackspots.
Checkpoints.
Travel times including alternative route times.
Built-up areas.
Having gathered all the information and formulated your linear recce leave
copies in the Ops room as well as copies in the vehicles. Remember to
remove these and place in secure holding away from unauthorised
personnel.
The process of route selection can be achieved by using the mnemonic
S.A.F.E.R.
S = Situational Awareness
Understand that the threat exists and make sure you are aware of the threat
ranges and history of the threats.
A = Avoid Routine
Make sure you avoid routine by using the same routes and times all the time,
this applies more when conducting daily types of journey. Try to have a
system in place for randomly selecting routes so that a pattern doesn’t
emerge.
R – Remain Anonymous
Weather overt or covert don’t go looking for trouble as it will surly find you so
try to remain anonymous in your tasks along routes.
TYPES OF JOURNEY
There are three types of journey that the SAP encounter:
1. Daily - Routine.
2. Hasty – Short Notice.
3. Special – Planned.
Daily – Routine
The daily routes taken i.e. from the residence to the office. These types of
journey require more attention to prevent routine setting in.
Special – Planned
These are pre-planned journeys where the SAP have had notice to carry out
full recces and planned for every eventuality.
SITE SURVEY
The site survey should be carried out as far in advance as possible and should
include the drop off / pick up points, entrance and exits vulnerability
assessments, exit routes, building plans, building staff security checks,
emergency fire procedures, safe rooms, emergency evacuation plans /
routes, building alarm systems, routes to the local Police or Fire Departments,
who will be attending the meeting, meeting durations etc. Take photographs
of the inside and outside of the building, details of other buildings close by.
Also liaise with various law enforcement, intelligence, or civilian security
contractors that may provide valuable information concerning to that
specific itinerary site.
Office
Considerations
Building plans.
Co-residence information.
Security procedures including vetting, and security equipment in place.
Staff details.
Variety of approach routes.
Parking facilities.
Embus / debus points.
Other building in the vicinity.
Fire and other emergency evacuation procedures.
Site a post room.
Package/courier delivery procedures.
Maintenance i.e., air conditioning.
Cybersecurity.
Hotels
As a Close Protection operative you will spend time in hotels, not just as
temporary accommodation but also for business and social meetings.
Here you could be sat in hotel corridors or foyer for hours at a time.
This is an area of the industry that requires a lot of discipline.
Let’s look at the threat level being a CAT 2: Medium Threat with an attack
likely at some stage.
Below is a list of some of the procedures you will need to put in place:-
Whenever the Principal requests to returns to the hotel the BG should inform
the RST or corridor security10 to 15 minutes before arrival enabling a security
check to take place including rooms/suites, corridors, stairways, entrance
and evacuation routes in case of an emergency.
If staying in a hotel for a long stay it would be ideal to have a dedicated ops
room/control room. Often this will be the team leader's or BG's room.
Considerations
Events
Meetings
Kidnapping
Assassination
Robbery, alternatively arrange a meeting and rob the residence or
place of work.
Set up for blackmail.
Harassment.
Considerations
Restaurants
Often the Principal has several favourite restaurants and that have been
assessed by the SAP already therefore it may only be necessary to make an
update of the information you already have. However, in many cases, a full
advance of the restaurant is required.
Airports
For long journeys, the Principal will in most cases travel by air. Commercial
aircraft journeys require airports and so follow routes and time schedules.
Therefore, the Principal may be vulnerable. Remember: the Principal is
vulnerable near or in transit. If possible and finances allow private aircraft are
preferable to commercial aircraft.
Getting the Principal in and out of airports quickly and safely and often
unnoticed is always an important consideration when travelling. As a result, a
significant amount of advance work will be required.
Considerations
SEARCH PLANS
The search plan will depend upon the circumstances of each separate
location, but the objective is always to ensure that the entire area is
searched thoroughly and reported as safe.
In addition to the main public and operational areas, the plan should ensure
that surrounding grounds and car parks are included as well as stairwells, fire
escapes, corridors, toilets and lifts etc.
To keep searches manageable and safe the search team members always
follow the same search procedure. Divide the area/premises to be searched
into separate sections and provide searchers with written checklists – signed
by the TL upon completion ensuring no area is left unchecked.
RED A definite kill zone, the immediate area which the Principal will be in.
AMBER Possible kill zone, the area outside of the kill zone.
GREEN All other areas.
Using a colour code search system is particularly useful for “Short Notice
Searching”.
The diagram bellow shows the areas to be searched in order when time is
limited. However be mindful with what the threat assessment dictates.
RECAP
Once you have identified the risks and threats you then think through what
practical measures that can be installed to minimise those threats and put a
Threat Assessment in place.
You can also use applications such as Google earth that will provide high-
quality aerial photographs as well as street views which can be used to
check out hotels, routes and locations.
Ideally members of the SAP will go ahead and prepare and implement
security plans as well as gather information covertly.
An evaluation of the country and the particular area(s) you will be
working including terrain, climate, population, religions, employment
rates, crime stats, and the languages spoken
Considerations:
From the information gained via the internet and further investigation through
embassies, you can establish how local criminal operate and what they look
for in their targets.
Criminals and terrorists commit crimes to make money or achieve a goal and
some are more sophisticated than others. Knowing how they operate and
what they look for will help formulate security procedures to negate them.
Criminal Taxis Drivers Look for targets for kidnapping and robbery
Luggage Theft From jewellery to laptops to planting drugs
Corrupt Police For cash
Date Rape Rape and / or robbery
Honey Trap For cash, blackmail or discretisation
HOSTILE ENVIRONMENTS
Below is a list of possible threats that you may find in hostile environments:
The insurgency has a strong anti-Western focus which could make any Western
interest or person a target. Attacks include bombs (roadside and other),
suicide bombs (either on foot or by vehicle), indirect fire (rockets and
mortars), direct fire (shootings and rocket propelled grenades), kidnappings
and violent crime.
The risk of being kidnapped throughout Afghanistan remains a very high and
constant threat. At least four foreign nationals have been kidnapped in Kabul
since July 2016, some of whom remain in captivity:
27 January 2018 – at least 105 people were killed and hundreds injured
as a result of a large vehicle borne explosive device which detonated
in a crowded area of downtown Kabul.
There have also been a number of attacks against aid workers and military
vehicles resulting in deaths and injuries, and there are ongoing military
operations throughout the north.
The eastern region has been extremely volatile for some time, with almost
daily suicide and roadside bomb attacks, shootings and rocket attacks. The
region close to the Pakistani border is extremely dangerous with a high
number of insurgents operating freely.
There are regular, large military operations in this region. There have been
numerous daily attacks against the Security Forces and US-led coalition
forces. There are also daily incidents of Improvised Explosive Devices (IED),
suicide and rocket attacks, and direct fire attacks on security forces patrols,
checkpoints and bases as well as on the local population.
There have been roadside bombs, suicide attacks, rocket attacks and
criminal kidnappings throughout the western provinces and increased
lawlessness in Western Ghor. There is little security infrastructure in Dai Kundi
and westerners have been kidnapped there.
KIDNAPPING
1. Mexico - Top of the list of countries where you are most likely to be
kidnapped in Mexico. Organised crime is rife and tourists are always an
attractive target. You may want to especially steer clear of areas such
as Tijuana, Juarez or Tampico.
2. Haiti -Kidnappers are a lot less picky in Haiti. Just looking less wealthy
will not guarantee your protection in Haiti. The country is fine if you stay
in your resort, but if you venture beyond the tourism safe zones, you
may be putting yourself at risk.
3. Brazil - Major cities such as Rio de Janeiro and Sao Paolo are the most
popular areas for kidnapping. Kidnappers work hard to target rich
people, particularly tourists. It is always a good idea to adjust your
appearance and do away with any showy items.
RESIDENTAIL SECURITY
In an ideal world, a security adviser would have a major part to play in the
selection of a Principal's residence, however, it is a case of making good out
of a bad situation and make good of what is already in place.
The Residential Security Team (RST) will have in-depth, detailed plans,
drawings, photographs and maps of the residence, details of the
surrounding areas and a security procedures plan.
Have a set of plans and a brief ready for external agencies such as the
Police, Fire Brigade, Ambulance Service, and Rescue Teams if a situation
requires.
Access Control
Safe Room
The safe room must be constructed so that it can withstand an assault until
help arrives, (Emergency Response Time). An ideal safe room choice would
be a cellar with a steel door, reinforced ceiling and walls. A good supply of
water, toilet facilities, fitted with a panic alarm system, CCTV system, and a
communications system (be aware that mobile phones may not work in the
cellar). Also ensure that there is an extensive first aid kit including a
defibrillator.
Mail Handling
Ideally, depending on the threat, what the threat assessment dictates and if
resources allow have trained staff to screen and open all mail in a
designated controlled area.
Recognition
Security Measures
The team leader is responsible for ensuring all policies are followed not only
security policies but also those required by the Principal. These include:
The team leader will also be responsible for the review of security procedures
and emergency plans. This is a review of defences and includes:
WALKING DRILLS
As stated in the Roles and Responsibilities chapter it’s the BG’s job to provide
cover and evacuate the Principal to a safe area. The role of the PES to
provide protection, engage the attack and assist the BG in giving cover and
evacuation.
The distance and spacing between the BG, the PES members and the
Principal will depend on the level of threat and the level of profile required.
With a pop star that likes to stand out and show that they are heavily
protected will require the PES to close ranks and show strength. While a
business executive may want a very low profile formation even to the point
where they do not realise they have a PES team around them.
Note. Often the Principal will want operatives in sight but not within a range
conversations can be heard. This is something that will need to arrange with
the Principal to what is comfortable for them without comprising safety.
However, ideally a BG needs to be within reach or striking distance.
All PES members must have a designated area of responsibility with the
ability to move into another team member’s position when needed without
hesitation or any confusion. The PES team must act as one constantly training
as a team and drilling different scenarios and tactics.
Each PES member is responsible for their arc of vision as well as being able to
see where your Principal is going, hand signs or gestures from the team
leader, and on vigilant watch for suspicious characters and general hazards.
CLASSIC PROTECTIVE FORMATIONS
The formations in this manual will give you a practical guide and a good
starting point from which you will be able to adapt to situations you
encounter.
The BG Position
Low-level threat.
Arm's length or striking distance away from the Principal
Slightly to the rear and side of the Principal.
Note: In this diagram the building to the left of the Principal act as hard
protection however it’s crucial to be mindful of doorways and alleyways.
Diagram below shows VIP, BG and two PES - A classic low profile formation
with PES 1 and 2 on the opposite side of the road.
Diagram shows VIP, BG and 3 PES - Classic high profile box formation.
VIP, BG and 4 PES - Four man PES team lowering the profile by spreading out.
Diagram shows the VIP, BG and 3 PES - High profile arrow formation for
cutting through crowded areas.
3 1
ATTACK
2
4
FIVE PRINCIPLES OF PROTECTION
There are five main principles we must consider when carrying out protective
duties:
2. Body cover.
Actions on procedures.
Control of the Principal at all times when maximum body cover is
required.
Control the Principal with words of command and firm physical
movement.
5. Spacing.
Be flexible and able to adopt to the environment you are in.
VEHICLE BACK-UP
When possible, have the Principal’s vehicle close at hand and available to
evacuate if necessary. The SAP will be responsible for planning the back-up
vehicles routes, parking/waiting areas plus provide details of when the
Principal will be out of sight particularly in pedestrian-only areas i.e. city
centres.
Considerations:
RESPONDING TO ATTACKS
As stated earlier in this manual it’s the PES job to engage an attack, protect
the Principal and assist the BG in evacuating the Principal to safety.
Important Note:
Be mindful that an attack could be a diversion to draw the attention of the
PES then leaving the Principal exposed. Or, the BG moves to evacuate the
Principal to a safe place only to be moving the VIP toward a secondary
attack.
TYPES OF ATTACKS
Verbal Attack
Just because its only verbal abuse it doesn’t mean that it isn’t the start of a
more serious attack.
Weapon Attack
Whether the attack is with a knife or a handgun it’s a very difficult and
dangerous situation especially if the PES and PPO / BG are unarmed
(Country’s Law).
The PES team member closest to the attacker must decide to engage
the attacker. (If unarmed how ?)
Close down the protective formation “Tight and Close” around the
Principal providing full body cover.
Be mindful of the distance between attacker and PES team / Principal.
If armed use suppressive fire. The volume will play a very important part
when moving the Principal to safety.
PES team and PPO / BG, giving full body cover evacuate the Principal
to safety.
PES team member who engaged the attacker joins the team.
Note:
An aggressive response to an attack can divert the attacker from being the
aggressor to a defender looking to survive.
Sniper Fire
The distance is going to play a major role as well as knowing exactly where
the shot came from.
Nuisance Attacks
The lawsuit by paparazzo Aja Oxman states Bieber ordered his bodyguard to
take a memory card after the photographer snapped photos of the pop
singer leaping from a cliff into the ocean on the island of Kauai. Bodyguard
Dwayne Patterson placed Oxman in a chokehold and seriously injured him
and damaged his camera during the November incident, the lawsuit states.
Patterson was arrested on suspicion of assault and later charged with
second-degree robbery. He pleaded no contest to criminal property
damage and harassment and was ordered to pay Oxman $6,000 in
restitution, court records show. Bieber, 20, was not arrested and no charges
were filed against him due to a lack of evidence that he ordered Patterson
to attack Oxman, Kauai County Prosecuting Attorney Justin Kollar said
Wednesday. Kollar said Patterson had fully paid restitution to Oxman.
NBC News
SITUATION AWARENESS
Endsley’s definition1999.
Chapter 9
EMBUS - DEBUS
A Principal will carry the majority of his travelling from A to B via car, therefore
is another area/time where the Principal will be most vulnerable - entering
(Embus) or leaving the vehicle (Debus).
This is a time when the vehicles are stationary, for example the Principal is
being dropped off outside their hotel before the driver takes the vehicle to
the hotel’s secure parking area. It is during this time the Principal is in the
open and without the protection of their vehicle and when the Personal
Escort Section (PES) and BG will need to deal with unwanted attention from
the press and the public or some kind of attack.
If the attackers know where the vehicle is going to be parked or where the
Principal is going to be dropped off or collected then they are in a much
better position to plan and carry out an ambush.
VIP
BG
Unorthodox - the VIP gets out of the vehicle and then has to walk around to
the rear of the vehicle and across the road to get to the venue. In a two-car
scenario, there would be enough comfortable space between the two
vehicles to walk between.
Orthodox Debus – Two vehicles, VIP, BG and 1 PES
PES 1 from the rear vehicle moves to the venue ahead of the VIP and BG.
PES 1 will signal the BG that it’s safe to let the VIP exit the vehicle.
2
3
2 1
3
4
4
The PES debus first and into their positions. PES 1 (TL) will signal BG that the VIP
is safe to exits the vehicle and head to the entrance.
Reverse these procedures for Embus.
Embus Procedure:
Debus Procedure:-
Vehicles stop outside the venue with the Principal's door in line with the
venue entrance.
PES 1 (TL) moves to venue entrance.
PES debus vehicle and take up protective positions looking outward for
threats.
BG moves to VIP’s door.
PES TL signals BG that it's safe for the VIP to debus
BG opens VIP door and ensuring all is clear.
Principal debuses and moves to the venue followed by the BG.
PES move to venue.
The BG shield the Principal with the car door and his / her body.
An orthodox or unorthodox drill will dictate where the BG stands.
If the car door is between the BG and the Principal it is a barrier and
obstructs you from reaching the Principal in an emergency.
Remember; all vehicle doors should be left open, in case something
happens before the Principal reaches the safety of the venue, in which
case you will evacuate the Principal back to the vehicle for immediate
extraction from the area.
Embus Considerations
Ensure that the cars are in position before the Principal comes out of
the building. Failure to do this will greatly increase the threat and
reduce the ability of the Close Protection team to react to any
potential incident.
Ensure the distance between the car and the building is the shortest
possible. The shorter the distance the Principal has to walk the less time
an attacker will have to make his move.
The BG will inform the team that the Principal is ready to come out, so
you can be in position.
Ensure the drivers and vehicles are ready to move, the vehicle in gear,
foot on the break, handbrake off.
As soon as the Principal and the BG are in the car, it should pull away.
The team must look outwards, not inwards towards the Principal. They
need to be aware of their surroundings to know the movement of the
Principals vehicle and any crowds nearby.
Be prepared with escape routes should an attack happen.
Debus Considerations
High Profile:- People will be watching at public events, i.e. Film Premiers, the
opening of new venues or election meetings etc.
Low Profile:- ensure not to draw unwanted attention to the arrival of the
Principal.
1
3 3 1
ATTACK
2
4
In the scenario, PES 1 has moved to the venue door. As the Principal exits the
vehicle he is attacked, “contact right”. PES 1 moves to engage attack with
PES 2 (PES 2 closes to the attacker so engages immediately). PES 3 moves to
assist the BG and provide body cover to the VIP. PES 4 moves to give
protection from the rear as the VIP is rushed into the hotel. In this situation the
vehicle can also engage the attacker to add protection.
Statistics show that 95% of kidnappings happen between the home and the
office.
Unless you are working with a Principal who is a very high risk from kidnapping
or assassination or a country of a high degree of instability you will most
probably work in standard, non-armoured vehicles.
If however, security takes priority you should consider the following as
standard:-
A powerful engine.
ABS braking system.
Power steering.
Locking bonnet, boot and petrol cap.
Top of the range alarm and anti-tamper system.
Electric windows and central locking.
Air conditioning.
Run-flat tyres.
Tracking device.
Wire mesh in the exhaust pipe.
Photographs of the engine compartment and underneath.
Overt Vehicles
Overt armoured vehicles will be used within hostile environments and the
threat assessment will dictate the level of armour required along with the
finance that is available.
There are a number of considerations to take into account when looking at
the type of vehicle(s) required. Are the vehicles fit for the task in hand?
Size
Weight
Terrain capability 4x4
Security and safety measures i.e. locking systems, fire rating, access, run
flat tyres, armour plating, reinforcement etc.
Electronic Counter Measures equipment.
Air conditioning
Protection levels B4, B5, B6 and B7 indicate their ability to resist different
bullets from penetrating the inside cavity of the vehicle with ballistic glass and
armour.
Vehicles in Hostile Environments the minimum requirement is B6 or NIJ:III.G.
Ballistics Rating (BR): This is a European standard which certifies the materials
used both transparent (BR - DIN EN 1063) and opaque (FB - DIN EN 1522/23),
general guidelines on vehicle construction and covers 3 levels from 2 to 7.
This is usually grouped under a single definition of B, e.g. B6
Kevlar fibre does not melt or shrink when exposed to extreme heat and flame
and is extremely resistant to cuts. Ballistic panels made with Kevlar fibre
perform well over a broad range of environmental conditions and maintain
ballistic performance after years of service.
Vehicle armour made using Kevlar fibre helps provide better protection at a
lower weight allowing for reduced fuel consumption, higher payloads, and
increased manoeuvrability.
Driving as a Close Protection Operative
At times PPO's / BG's may be asked to undertake driving duties especially if
there is no appointed security driver of the chauffeur. Sometimes it might be
that the Principal like to drive themselves.
Points to consider:-
VEHICLE SECURITY
Other considerations:-
Vehicle Search
The driver will know the car better than anyone else, therefore, the driver plus
a team member is the minimum number of operatives needed to search a
vehicle, one to search and one to co-ordinate and record. The vehicle must
be kept clean and a security check making notes of items and positioning of
those items left in the vehicle whenever the left for any period.
Mirrors.
Torches.
Screwdrivers.
Pliers.
Plastic strips.
Vehicle tool kit.
Overalls.
Note pad & pen.
X-ray machines.
Density Meters.
Mine detection systems.
Flexible camera systems.
Surrounding Area
A device may be planted near the vehicle with the use of a triggering device
whether from a distance by way of remote control or by the vehicle itself.
Look for:-
Pay attention to the paintwork, mirrors and windows for finger marks
and oil smears.
Check the bodywork and wheels/hubcaps for any tampering.
Partially closed doors, bonnet and boot.
Check wheels, tyres and hub caps for sharp objects, punctures,
loosened wheel nuts, lever marks on hub caps, objects forces under
the tyres, oil spills.
Look up and around the inside of the wheel arches.
Underneath
Overalls required.
Boot
Can the boot be opened via key fob or external catch?
The procedure for opening the boot.
Interior
Inspect the whole of the interior through the windows first. Cross-check with
your list of any items and item positions of anything left in the vehicle. (Ideally,
the vehicle should be clean and tidy at all times and cleared of any items
before end of shift).
Look through the windows for interior disturbances i.e., seatbelts, marks
on the upholstery and carpets. Items not recognised and left in the
vehicle.
Work from the back doors to the front doors.
2 man search procedure as one man slowly opens the door the
second operative is checking through the opposite window.
Partially open doors and carry out a visual check of door shuts and
seals.
Carry out the plastic strip procedure as in the boot search.
Continue to visually inspect the doors as the door is opened.
Pay attention to the hinge area and interior light switch.
Ideally no floor mats but if they are in place visually check to look for
bumps showing something has been placed under the mat.
Remove mats.
Check under seats.
Leave doors open.
Bonnet
The same procedure as the boot applies here regarding the releasing of the
bonnet catch.
One person to retain pressure on the boot lid whilst the other person releases
the catch.
Assassins and kidnappers will more often choose vehicle attacks due to the
simple fact that they allow them to select the time and place of the attack.
Vehicle Security
A vehicles not being used should still be secure even in secure areas such as
the residence or garage, etc. The level of threat determined by the threat
assessment will dictate the necessary level of security required while the
vehicles are parked in a secure area.
1. SAP vehicles to leave three minutes earlier than the Principals vehicle if
a daily journey.
2. Check again for suspicious vehicles or individuals.
3. Lock all doors and boot.
4. Windows opened no more than two inches.
5. Ideally Principal to sit in the rear and behind the BG.
The Law
DRIVER AWARENESS
JOURNEY MANAGEMENT
The PES team leader and/or the BG in consultation with the SAP are
responsible for the planning and conduct of journey management in order to
reduce or minimise known threats.
TACTICAL DRIVING
The position of the PES vehicle relative to the Principal's vehicle is crucial to
provide immediate security when required.
The Principal’s driver and the PES driver must work together to position
their vehicles in a way to that will provide good observation and
defence.
The PES vehicle must be able to see ahead of the Principal’s vehicle.
The PES vehicle must always be in a position to react to situation when
required and enhance defensive capability.
The diagram below shows the PES vehicle pulling out into the road ahead of
the VIP vehicle. Not only does this allow visuals ahead but also provides a
block, not allowing any vehicles from the rear getting between the VIP and
the PES vehicle as well as preventing any attacks from the rear. Once given
the signal to go the VIP driver moves out ahead
View ahead
The diagram below shows the positioning of the PES vehicle to the VIP
vehicle. The PES is slightly offset to the VIP vehicle to act as a block and
increasing its field of view to the front.
Left Turn Right Turn
Vulnerable
Motorway: - PES keeps to the outside lane and vets vehicles coming to
overtake from the rear. PES will allow vehicles to pass once vetted.
Motorway: VIP vehicle moves to the exit and the PES moves to give cover
and then adopts the normal positioning.
Considerations:-
ANTI-AMBUS DRILLS
The ambush is a very popular tactic which has been very successful in both
rural and urban environments by giving the attackers the advantage of the
element of surprise, time, choice of ambush point and the option of aborting
and planning for another day.
Historically, in assassination type attacks, 85% of these attacks occur near the
residence and in or near the vehicle. If we can anticipate an attack, even
for a few seconds, we have a much better chance to execute specific pre-
planned manoeuvres to defeat an ambush.
In studies, most attacks were carried out by employing two vehicles. One
vehicle was employed to impede or cut off the target vehicle and the other
vehicle was employed to launch the attack itself. For example, a car pulls out
in front of the Principal’s vehicle after a distance the car starts to slow down
to impede the speed of the Principal’s vehicle. A second car behind the
Principal pulls out to overtake. As the second car comes alongside the
Principals vehicle, the occupants of the second car open fire on the
Principal.
Depending upon the terrain, the type of ambush, the vehicles being used,
etc. the specific immediate actions may differ but, in general, the best
reaction to a threat is to move preferably away from the attackers. By
moving we will gain more options and increase our survivability.
In some cases, your only or best option may well be to drive at the attackers
and ram.
Almost every study on ambushes has shown that response actions that get
the targets moving from the attack site increase the target’s chances of
survival.
Attack Recognition
When carrying out your routes recces think like an attacker and established
ambush points, where can the road be blocked to limit escape, best places
to lie in wait, secondary ambush etc.
Something is different.
That’s not usually here.
That’s an unexpected diversion (road work start dates are often
signed).
Behaviour Patterns
Unusual activity.
Lack of activity.
Fight or flight ? In Close Protection unless you have no other option “Flight”.
To make the flight successful often requires h high level of aggression and an
immediate response by fleeing to a haven such as a Police or Fire station.
Terrorist will endeavour to stop a vehicle by stopping the driver. In 70% of all
attacks the driver will be hit therefore as a driver you need to lower your
profile to a slouch position but still maintaining control of the vehicle.
Ramming Procedure
1) Slow down.
2) Select low gear.
3) Select impact point front or rear wheel arch.
4) 25 – 30ft away accelerate hard.
5) Drive straight through
6) Keep going
Motorcycles: If a motorcycle can move into a position next to the VIP vehicle
they will be able to:- Fire shots, attach an IED, take photographs.
Motorcycle attacks are one of the most common methods of assassination.
The Y Turn
VIP
Blocked Front and Rear
If blocked to the front and the rear with no means of the vehicles being able
to exit the attack site you will need to escape on foot.
Vehicle spacing allows cover from doors. PES and BG to provide body cover
and evacuate the VIP from the attack zone to a safe house.
VIP Vehicle Disabled
PES manoeuvre into position providing cover while the Principal is moved
from the VIP vehicle to the PES.
Once Principal is in the PES vehicle and down in the floor well covered by the
BG, the PES driver reverses away from the block and carries out a Y turn to
escape the attack zone.
PES
VIP DRIVER
BODYGUARD
VIP
1) BG moves to the back seat of the VIP vehicle to provide body cover to
Principal.
2) PES 1 and 2 engage attack (PES 2 from inside the vehicle).
3) VIP driver and BG provide body cover to the VIP between vehicles.
4) VIP is pushed into PES vehicles floor well.
5) BG and VIP driver provide body cover in the PES vehicle.
6) PES 1 gets in vehicle with PES 2 still providing return fire.
7) PES driver reserves away from the attack zone, performs a Y turn and
escapes to safety.
The team leader will determine the configuration based on the level of
threat, types of threat and the requirements of the client.
Ideally a minimum convoy of three vehicles will be used with the lead vehicle
being an armoured 4x4 with all personnel armed. This lead vehicle will be
responsible for navigation and reporting.
In the centre vehicle will be the Principles vehicle, again armoured and the
rear vehicle is the backing vehicle required to provide additional protection
from the rear, side or moving forward to the front to provide the additional
protection.
Convoy Movements
Detailed plans and detailed orders will be provided before any movement /
travel plans commence.
Rehearsals will be practised by team members covering a wide range of
scenarios from a traffic accident to a kidnapping attempt.
RV and check points will be established and once the convoy has reached
each point information will be communicated to the operations room.
Vehicles will be close enough to offer emergency response and assistance.
Communications is critical between each vehicle relaying information such
as times, speed, overtaking, roadworks, traffic lights, check points, and
suspicious goings on etc.
Separated or Lost
Check your GPS to confirm Longitude and Latitude together with your
direction of travel and report the operations room.
Stay calm and reassure the client.
Make notes of landmarks and attempt to relocate your position.
Move back to the last RV informing the Operations Room.
Breakdown
Provide details of breakdown to the operations room.
Ensure safety of the client.
Recover any sensitive documentation, weapons and ammunition from the
broken down vehicle.
Use a GPS to gain and accurate grid reference of your position.
OPERATIONS ROOM
The Ops room (Operations Room) is the central hub of the operation for the
whole team. It will be the centre for all communications, information and
equipment.
There are two main types of operation room that we need to be aware of:-
Both static and mobile operations rooms will be equipped and not limited to
the following equipment:
-
Computers, scanners, printers.
CCTV system with monitors or one large screen with multi-scene
capabilities.
Alarm panel with zone details.
Communications equipment including chargers. Calls signs displayed
on the whiteboard.
ECM (Electronic Counter Measures) devise.
Mobile surveillance equipment.
Search and detection equipment.
Go bags.
Telephone system.
First Aid and Defibrillator.
Fire-fighting equipment.
Information:
Daily itinerary.
Route maps and building plans.
Radio checkpoint details.
Security procedures.
Threat assessments.
Transport details.
Logbooks for keys, visitors, security checks etc.
Rotas and SOPs.
Emergency contact details including emergency response times.
Emergency and immediate actions procedures.
The Ops room is run 24 hours a day by way of shift patterns and hand-overs
where oncoming personnel are briefed by the outgoing personnel.
Brief/debrief to include:
SURVEILLANCE
Surveillance – The observing of person(s), places or objects whilst static, on
foot or mobile in a vehicle by covert or other means.
This is achieved by the following:
TYPES OF SURVEILLANCE
Overt Surveillance – is carried out by using methods and devices that are
visible and obvious.
PROTECTIVE SURVEILLANCE
Example
The threat assessment dictates that a level of protection is required, however
finances only allow for a BG, and two SAP.
The SAP go a head of the Principal and once they have reported back to the
BG that the route is safe they take up protective surveillance positions
monitoring movements and looking for anything suspicious prior to the
Principals arrival.
HOSTILE SURVEILLANCE
In order or for anyone to carry out a successful attack they must carry out
intelligence gathering execute some sort of surveillance to plan effectively.
Information required will be and not limited to:-
Targets Identity.
Addresses – home, work, venues.
Vehicles – routes, travel arrangements.
Family and associates.
Existing security measures.
When planning an attack the hostile wants to know how easy it will be to
carry out and how easy it will be to escape. There are three different and
compounding types of “ease” that are considered when planning a physical
attack. For example
The attacker will try to obtain enough detailed information from online
resources, site visits, insider knowledge and will want to be certain about the
reliability of this information to be sure of success.
In general, the more sophisticated the attack the more complex the attack
planning. Therefore more accurate reliable information and more detailed
reconnaissance are needed.
Gathering information from open sources can be done from anywhere in the
world is not only easy to find but also free. The information from open sources
include:-
Once the plan of attack has been formulated the next step is to ensure the
attack can be carried out with success including:
The next step is to prepare by way of training and rehearsal. For example
Execution Phase
Here the attacker observes his / her target immediately before the planned
attack to proceed or cancel the attack for whatever reasons for example,
more security have been drafted in. In this situation the attacker is more at risk
of being detected and caught. However, the longer time spent on
surveillance in this phase the more likely the attacker will be detected.
Escape and Exploitation Phase
This phase comes after the execution and is the realisation of the attack
goals.
These phases form the basic process used by almost every hostile entity from
petty thieves to bank robbers to terrorists:-
1. Gather Intelligence.
2. Plan and Prepare.
3. Execute.
4. Escape and Exploit.
SURVEILLANCE DETECTION
As previously stated for most attacks to take place and be successful the
attacker/hostile needs to spend an amount of time researching and planning
the attack (See the Four Phases of Hostile Reconnaissance) and so spend
time in the field following a target and gaining intelligence. It is here that
surveillance detection operatives seek out opportunities to detect hostiles
before an attack.
To know your enemy you must become your enemy – Sun Tzu.
When attempting to identify hostile surveillance, you must become the
attacker.
First, identify with the area you are working within and blend in with the
surrounding. For example, the Principal has a meeting in the city with his
lawyer at his lawyer's office which is in an area of office blocks occupied by
insurance companies and legal firms, therefore, you need to dress and act in
such a way to blend in. You will stand out in a t-shirt and jeans.
Coffee shops
Park benches
Crowded areas and any environment where the surveillance operative
can naturally blend while observing the target.
An example of a correlation:
Your Principal, the target is staying at a hotel in London for five days while on
a business trip. One of the surveillance detection operatives has spotted an
individual that sits in the hotel foyer every morning at the same time and pays
specific attention to your Principal. The correlation here is that an individual is
the hotel foyer every morning at the same time and pays specific attention to
your Principal. The presence of the individual over time is also a correlation. If
a week later the same individual is seen outside of the lawyers' office (as in a
previous example) then this would be a correlation over distance.
As a member of the CP team and the SD operative, you will know your
Principal's movements in advance including details of:-
One week before the conference you carry out surveillance detection of the
venue and its immediate vicinity.
Facial features.
Build.
Mannerisms.
Gait.
Identifying marks such as scars and tattoos.
Nervous traits.
Body damage.
Stickers and other unique characteristics.
Registration numbers.
ATTACK DETERRANTS
COUNTER SURVEILLANCE
Once hostile surveillance has been detected counter-surveillance tactics are
then employed. “Surveillance on Surveillance”.
PERSONAL SECURITY
All types of criminals from terrorists to stalkers not only carry out surveillance
on VIP's, business executives and celebrities they also carry out surveillance of
security personnel and other staff.
When walking along a street, turn around and go back being mindful
of people you walk past i.e., do they take interest in your change of
direction or do they stop to observe where you are going. Be mindful of
anyone walking and following you on the opposite side of the road.
Carry out this drill a number of times and see if the same person or
same couple become familiar.
When driving you can do a couple of U-turns or even drive around a
roundabout a couple of times.
Use reflections in windows and surfaces to see who is behind you.
Use your mobile phone’s camera to see who is behind you.
Go up and immediately down escalators and see who follows.
Take note of people in parked cars near your residence or place of
work. Vans and cars with blacked-out windows. Ask yourself "why has
someone been sat I that car for the last 2 hours?"
Drive slowly and see if anyone does the same. Pullover and pretend to
use your phone and see if they pull over or slow up ahead of you.
Board trains or buses at the last minute and see if anyone else does the
same. Even get off at the next stop to turn-around and get back on
again.
Go into a café and observe what is going on outside. Is anyone waiting
around? do they keep looking in through the window of the cafe?,
have they walked past several times?.
BODY LANGUAGE
COMMUNICATIONS
Good communications are a critical part of any close protection operation
to ensure that all protection team members know their duties and know
exactly what is going on around them.
Team members will not only communicate between themselves but also
outside of their circle of protection:
When operational the Ops room and team members will keep in contact
with each other by radio and/or telephone (landline, cellular, satellite).
Communication Security
There are some countries including the United Kingdom that have licencing
laws regarding radio communications, therefore, ensure you are aware of
any legal requirements.
Set up a password.
Update your operating system.
Download security apps.
Privacy settings
RADIO COMMUNICATIONS
The ear piece and cuff or pinch clip communication system has become the
stereotypical image for the bodyguard however they are essential in the
successful running of a close protection operation.
Communication Procedures:
Phonetic Alphabet
Voice Procedures
COMMUNICATIONS SYSTEMS
There are a number of communications systems that operatives must be
familiar with including UHF, VHF and Satellite. They also need to be
serviceable enabling a team member / members to maintain and service
when required.
HF Codan – Long range digital radio (LRDR) is the most reliable form of long
range communications without dependence on infrastructure. They are
based on the proven and robust high frequency hard-ward platform.
BUSINESS SECURITY
Some businesses will be more at risk than others because of the services they
provide, their high worth, and at times their business relationships.
The threat assessment process involves making logical assumptions about the
likelihood of a threat and its impact on the Principal, company executives,
staff and the business itself.
A threat assessment should not be limited from resources within the
organisation but should take advantage of external resources:-
www.MI5.gov.uk
www.homeoffice.gov.uk
www.businesslink.gov.uk
www.crimereduction.gov.uk
Protective Measures
The most effective security measures will include a combination of physical,
information and personnel security measures. This combination will work to
secure an organisation through a mix of deterrence and detection.
Disgruntled Employees
Internal attacks, selling information, sabotage.
Security Solution – identify all privileged accounts and credentials and
immediately terminate those that are no longer in use.
Mobile Devices
Data theft.
Security Solution – Put strict policies in place.
There are two methods with which cybercriminals hack into online public Wi-
Fi users:
1. Man-in-the-middle attack - which involves a hacker intercepting your
logins, passwords or financial information as you use the public Wi-Fi.
2. Fake networks – where the hacker is able to breach unsuspecting uses
online security and data.
Cloud Applications
Cloud-based threats.
Security Solution - Use strong encryptions, such as AES 256-bit, recognized by
experts as the crypto gold standard and retain the keys exclusively to prevent
any third party from accessing.
CONFLICT MANAGEMENT
What is important?
Who is Responsible?
Preventing Conflict
Common Flashpoints
S Step back
A Assess threat (P.O.P)
F Find help
E Evaluate options
R Respond
P.O.P. O = Object
Bottles / glasses
Furniture
Weapons
Tools
Moving vehicles
Needles/sharps
P.O.P. P = Place
Crowded areas
Staircases
Wet floors
Broken glass
CCTV coverage
Blocked exits
Aggression
What Turns People To Violence Anger
Frustration
Reducing Frustration
Sender
encodes
Sends Message
decodes
Receiver
Empathy
Empathising means:
Communication
Background noise
Heat, pain, anger
Language
Drink/drugs
Mental illness
Culture
Emotion
Attitude
Psychological noise
My behaviour My behaviour
Aggressive
Types of behaviour Passive
Assertive
A trigger is something that causes someone to lose their temper and turn to violence.
Triggers include:-
Embarrassment
Disrespect
Insults
Rudeness
Being ridiculed
Being ignored
Being patronised
Inhibitors
An “inhibitor” is something that stops someone from losing their temper and turning
to violence.
Inhibitors include:-
Fight or flight
Signalling non-aggression
Responding to conflict
Responding to a Threat
Fight or Flight
A response to a threat
A natural basic instinct
Prepares our body for action
into a fight or
Inappropriate gestures
or flight by or
Blocking there exist
or
Cornering them in
Signs of Escalation
High-Risk Conflict
High-risk conflict is when you are in immediate risk of being physically assaulted.
The 4 A’s
Signalling non-aggression
P Positive
A Attitude USE
L Look and listen OPEN
M Make space PALMS
S Stance
Look and Listen – watch what they are doing and listen to everything they say
Stance – consider your position to the person, consider how you look
Win-win
Where both sides of a confrontation come out of an encounter feeling reasonably
satisfied with the outcome
Saving face
Being listened to and taken seriously
Being treated fairly and professionally
Receiving a helpful explanation
Gifts
Extra Strategies
“A prepared way of getting yourself away from a difficult or dangerous situation”.
Team Working
“Contact and cover or lead and support”
The security officer initially dealing with the person and engage in
conversation
Stands closest
Should stand further away, to one side
Listens to and watches and does not get drawn into the conversation
Switching
Post-incident considerations
Debriefing Incidents
Incident
Why did it
happen?
Pain/injury
Anger
Shock
Disbelief
Embarrassment
Fear
And remember
Pocketbook
Incident book
First Aid book (RIDDOR)
Police statement
Ejecting/evicting a customer
Enforcement scenarios
Defusing scenarios
Confronting scenarios
High-risk scenarios