Security Operations
eBook - ePub

Security Operations

An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

  1. 252 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Security Operations

An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

About this book

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding of the basic concepts and rules that need to be followed in protective services, including what comprises good security practice. This second edition is fully updated to include new case scenarios, threat vectors, and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced, sophisticated schemes.

Security has always been a necessity for conducting business operations in both low- and high-risk situations, regardless of the threat level in the operating environment. Overseas, those with new ideas or businesses can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States, people become targets because of positions held, publicity, politics, economics, or other issues that cause unwanted attention to a person, their family, or business operations.

Security Operations, Second Edition provides an introduction to what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail.

FEATURES

• Identifies what can pose a threat, how to recognize threats, and where threats are most likely to be encountered

• Presents individuals and companies with the security and preparedness tools to protect themselves when operating in various environments, especially in high-risk regions

• Provides an understanding of operational security when in transit: to vary route selection and keep destinations and movement plans out of the public view

• Outlines the tools and techniques needed for people to become security conscious and situationally aware for their own safety and the safety of those close to them

An equal help to those just entering the protection business or people and companies that are considering hiring a security detail, Security Operations is a thorough, detailed, and responsible approach to this serious and often high-risk field.

Robert H. Deatherage Jr. is a veteran Special Forces Soldier and private security consultant with thirty years' experience in military and private security operations. His various writings on security topics cover security operations, threat assessment, risk management, client relations, surveillance detection, counter surveillance operations, foot and vehicle movements, and building security—blending solid operational theory with practical field experience.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Security Operations by Robert Deatherage, Jr. in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & Cyber Security. We have over one million books available in our catalogue for you to explore.

CHAPTER 1

Why Use a PSC Provider

The use of a personnel security company (PSC) for protection in a hostile area is a decision that needs to be made at a corporate level; not only will it be expensive, but it can also drastically change the perception of the company in the area in which it wants to operate. It can also either increase or decrease the risk to the company personnel (clients) that have to live and work in the area; so, the decision to employ a PSC should never be taken lightly or without some thought, and the company usually already has objectives in mind that it wants the PSC to achieve.
Remember that when someone hires a security company, their profile will go up in the area even if it is a low-profile company, new people now working, new vehicles in the area of operation, new rules and restrictions, etc. But, when a PSC is necessary to work in some environments, the methods that you choose to counter the threat to the company that has hired you, will determine if you are protecting their business interests. In hostile fire areas, war zones, and other high-risk or crisis situations; especially in those areas of the world where kidnapping, crime in general, and other types of attacks against foreigners or foreign companies is rampant, more and more government agencies, companies and private enterprises are contacting PSCs to help them operate effectively and allow them to continue their mission.
There are things that a security provider needs to do for the client, and things that need to be accomplished by both client and provider that will help meet the client’s security objectives. There are also certain things that will have to be provided to the client and things the security detail people need to possess in order to do their job. It is extremely important for anyone providing security to have relevant and adequate training along with sufficient experience in meeting the required security needs of the client. For example, standing guard at a warehouse in North Dakota does not give you the experience or training to run a static guard force in the middle of Iraq. Person Security Detail personnel need to be thoroughly trained in the jobs they are going to perform or oversee to allow them to do their job in a professional manner, and with confidence. There are so many things that can go wrong or that can happen when transporting someone to a mission site, waiting there for him to complete his mission, and then transporting him back to his safe area that saying your experience is “I drove for the general in Germany for two years” does not convey the necessary qualifications or experience for performing security functions during high threat incidents or situations.

CHAPTER 2

Providing Protection

There are many types of security that can be performed, but the two types I will spend the most time talking about are personnel security and physical security of property and equipment. The main mission of any security detail will be to provide a secure working environment that allows the clients to concentrate their efforts on accomplishing their mission or the task at hand.
So, for a personal security detail (PSD) or static guard force, the main objectives are: avoid any threats to the client, detect any threats to the client, and when detected, counter any threats to the client. This will allow the PSD to defeat the potential threat (criminal, terrorist, insurgent, etc.) with intelligent planning, unpredictability, and avoidance of danger and also heighten personal safety and security while minimizing the intrusiveness of security, which can make it impossible for the client to do their job. This requires a balance of protection, which is a way of saying that there will always be competing concerns between the client and the security provider, that is, the need for certain levels of security versus the need of the client to travel, work outside, or interact with others, Examples include engineers who need to move to sites; contracting representatives going to meet their clients; giving tours to local politicians; and crews that need to work outside exposed, such as movie stars, celebrities, and medical personnel. These are all commonly encountered when working on security details.

Protection Strategies

  1. A proactive protection strategy is probably the best bet when it comes to the type of overall protection that can be provided. Proactive protection is more of a prevention-based method that involves multiple tasks taking place continuously to ensure the client’s safety. These tasks include but are not limited to:
    • risk-reduction techniques, such as surveillance detection teams and fixed point counter surveillance
    • running your own source operations in the communities around your living areas and your other primary areas to keep track of new people, unusual activity, etc.
    • risk assessments
    • analysis of threat levels
    • and lots of interactions with local police intelligence and counter terrorism officials
It also includes all of your preparations for movement or receiving people at a fixed site, advance work at each site to be visited, route surveys, anticipating what is going to happen, resource allocation, and plan development. (You can’t absolutely prevent everything, but you can certainly try)
  1. A reactive protection strategy is a response (reacting) to something that is taking place or has already taken place in the last few seconds or minutes; this type of response usually only has two components:
    • First is the evacuation of all non-security personnel, that is, the client or clients; get him out of the area as quickly as possible and to one of the designated safe areas for his protection.
    • Second is the neutralization of the threat; this usually happens when you do not have the ability to evacuate the client immediately and must stay in that general area. Neutralizing the threat ensures your client’s protection until he can be evacuated to that safe area.
Personal security for the client is the responsibility of those members of the protective team who are physically with the client whenever they are away from their secure area, including movements between sites and providing security once they get to those sites or work locations that they are visiting on a short term basis.
When talking about physical security, we are talking about the advance teams that will secure the sites being visited and are responsible for the other duties associated with advance work. We are also talking about the static guard force; any physical barriers such as fences, doors, and associated hardware; personal protective equipment such as body armor, protective helmets, and protective masks; and armored vehicles. Both of these areas require planning to accomplish which entails many subtasks such as intelligence, long range planning, route reconnaissance, threat assessments, and physical security assessments. I will try to cover all these subtasks later in the book.
In a standard situation, the client’s time is generally split between the office and the residence, with minor detours and changes throughout the day or week to other primary areas. A client working in a high threat area usually lives and does administrative work in one secure location, but must travel out to work sites and other locations for meetings with other companies, governments, or their clients. There is no way to gauge how much time a client will spend at his secure location, other locations he needs to visit, and the actual work and/or construction sites. In the normal environment such as a client’s home country, a low or medium risk area, or if you are protecting an individual (instead of having a company as a client and being responsible for many personnel at once), the normal VIP is usually at his primary residence for around 40% of the time and at the office or other primary locations for the remaining 60%.
The most predictable time of movement, regardless of where you are located, is in the morning hours. In high risk or high threat areas, the military or government usually restricts movement along controlled routes anyway, but there and in any other location, this is the time it is hardest to change a routine or alter an schedule. But, during the evening hours, the client is much less predictable because there is nothing set in stone, such as the time they depart from the o...

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Acknowledgments
  7. Author
  8. Introduction
  9. Chapter 1: Why Use a PSC Provider
  10. Chapter 2: Providing Protection
  11. Chapter 3: The Client
  12. Chapter 4: Security on a Budget
  13. Chapter 5: Components of Protection
  14. Chapter 6: Composition of the Security Detail and Their Responsibilities
  15. Chapter 7: Knowing the Threat
  16. Chapter 8: Risk Management
  17. Chapter 9: The Advance
  18. Chapter 10: Surveillance Detection Program
  19. Chapter 11: Awareness Levels for the Security Professional
  20. Chapter 12: Situational Awareness
  21. Chapter 13: General Guidelines for PSD Operations
  22. Chapter 14: Foot Movement Tactics and Techniques
  23. Chapter 15: Public Venues and Functions
  24. Chapter 16: Route Selection
  25. Chapter 17: The Phases of Route Planning
  26. Chapter 18: Moving the Client
  27. Chapter 19: Motorcade Operations
  28. Chapter 20: Car Operations and Tactics
  29. Chapter 21: The Counter Assault Team (CAT)
  30. Chapter 22: Counter Sniper Operations
  31. Chapter 23: Building Security Considerations
  32. Chapter 24: Building Searches
  33. Appendix A: Types of Surveys
  34. Appendix B: Vehicle-Oriented IED Search Checklist
  35. Appendix C: Personnel Search Techniques
  36. Appendix D: Route Survey Format
  37. Appendix E: Security Detail Operations Orders
  38. Appendix F: Observation
  39. Index