100% found this document useful (1 vote)
172 views79 pages

VIP Protection, Protection For Dignitaries

The document outlines the principles and practices of VIP protection, emphasizing that 90% of safety relies on prevention and proactive measures. It details the phases of security, sources of danger, and the roles of security personnel, including the importance of vehicle safety and driving techniques. Additionally, it discusses emergency procedures and the organization of protective teams during public events and vehicle caravans.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
172 views79 pages

VIP Protection, Protection For Dignitaries

The document outlines the principles and practices of VIP protection, emphasizing that 90% of safety relies on prevention and proactive measures. It details the phases of security, sources of danger, and the roles of security personnel, including the importance of vehicle safety and driving techniques. Additionally, it discusses emergency procedures and the organization of protective teams during public events and vehicle caravans.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

PROTECTION

1PERSONNEL EXECUTIVES AND DIGNITARIES


TAKE VERY INTO ACCOUNT THAT

In SECURITY, 100% of LA cannot be guaranteed.


VIP PROTECTION.

GPE School [Link]


05% INTUITION or LUCK

PREVENTION represents 90% of Safety, which is why “Actions” should


be concentrated at this stage.
THE VIP AS AN OBJECT OF
PROTECTION

• WHO IS A VIP (Very Important Person) Very


important person: dignitary, highest-level
public official, diplomat, personality,
businessman or any person who needs
protection)

• THREATS AGAINST A VIP. Actions


against VIP security. It has several
purposes, which is why the security team
must and have to minimize the capacity
of the aggressor(s), neutralizing the action when it
occurs.
Comprehensive Risk Scheme
Violent and Non-Violent VIPs

GPE School [Link]


DRAIN

Risk factors that threaten FOR INFORMATION

against VIP Security


EMINENT DRUG TRAFFICKING COMMON
DANGERS MONEY LAUNDERING CRIME ARMED ROBBERY
AND ASSAULT

SUCCEPTIVITY OF HOMICIDES

CONTRIBUTORS IMMIGRATION
BRIBES TO THE CORRUPTION COVERS
LEGAL SYSTEM THEFT
ALL TYPES OF
CRIMES ACCORDING TO
SALESMEN THE GOOD
HITMAN
AFFECTATION SCAMS AND
POLITICAL FRAUDS
WORKPLACE
MANIPULATION OF ARMS
INFILTRATION
THE LEGAL SYSTEM TRAFFICKIN TELEPHONE
G STORAGE
ORGANIZED IMMORALITY
CRIME

EARTH POVERTY
QUAKE
S
CRISIS
RISKS FIRES
ECONOMIC ECONOMIC
NATURAL DEPRESSION
LOSS OF
FLOODS
PURCHASING
POWER
PERSONAL
ACCIDENTS
FUNDAMENTALS OF THE PROTECTION
OF PERSONALITIES
Since ancient times, attacks on personalities have existed, mainly when they
perform functions of certain relevance, occupy representative positions within
society or participate in political activities. Unfortunately, there are conditions that,
on certain occasions, are risky for them.

MAIN CAUSES OF ATTACKS ON PEOPLE

■ POLICIES
■ IDEOLOGICAL C

■ PSYCHOLOGICAL eit

■ ECONOMIC he
r
oo

■ RACIAL E
or
LLÍ

■ RELIGIOUS EIT
HE

■ PERSONAL
■ SOCIOLOGICAL
SOURCES OF DANGER

- Activity of armed groups, local or national terrorists.


- Presence of organized crime gangs.
- Political and/or professional detractors.
- Resentful collaborators or those with psychopathological disorders.
- Attendance at mass events with the presence of hostile groups.

GPE School [Link]


- Negligent actions of the protected person.
- Racketeering. International Networks (Mafia), Drug Trafficking, Arms
Trafficking and International Terrorism.
- Common crime. Personal and economic interests.
- Isolated individuals or organized groups.
PHASES OF SECURITY to PERSONALITIES

or Prevention Phase. Preventive actions with sufficient anticipation of their


manifestation, capacity for observation, detection and deterrence, observation
is of great importance.

Phase. Physical coverage that provides the


or Protection
team protection by positioning it close to the VIP.

or Reaction Phase. Response capacity to neutralize an


event, generally at the beginning of the attack or
aggression.

GPE School [Link]


or Evacuation Phase. Ability to evacuate the protected
person to a quiet, danger-free area in the event of an
emergency situation.
VIP
PROTECTION TRAINING OBJECTIVE

A. PREVENTION. Passive and Active.

B. REACTION. Ability to act quickly and effectively when push comes


to shove.

C. RESCUE. Rescuing the VIP victim of an attack, with the aim of


saving his life.

GPE School [Link]


RESCUE

PREVENTION
PASSIVE -
ACTIVE
SPHERICAL PROTECTION THEORY

It consists of covering the space contained in a sphere, the center of which


is the person to be protected.

PHYSICAL
BARRIERS

G
P
EFFICIENT ALERTS E
S
c
h
o
ol
EFFECTIVE SECURITY C.
COUNTER SURVEILLANCE

IT IS A SECURITY ACTIVITY WHOSE PRIMORDIAL function IS THE DETECTION OF

RISKS AND ELEMENTS CRIMINAL, WHEN THESE ARE

FIND CAPTURING INFORMATION ABOUT


POSSIBLE GOALS AND EVEN WHEN THEY HAVE DECIDED
THE COMMISSION OF AN ACTION CRIMINAL.

COUNTER-SURVEILLANCE CAN BE ESTABLISHED SPORADICALLY OR SYSTEMATICALLY, IN THE ROUTES

GPE School [Link]


AND POINTS OF ORIGIN AND DESTINATION OF THE CARAVAN IN

WHICH THE PERSON IS TRAVELING.


SECURITY CHIEF

> He is directly responsible for Comprehensive Security.

Plan, organize, supervise and control personal


protection services, assign the human resources
and material means necessary for a correct one
and effective
execution of personal security
operations.

Develops and informs members of operational


teams of the tactical and technical
implementation regulations that describe the
general functions, basic principles of action, as
well as the procedures for operational and
administrative control of the services.
TEAM LEADER

He is operationally responsible for:

- Communications, evolutions and


disposition of the different components of the
team, who make up the protected person's
personal escort.

- Supports the Head of Security in planning


services and maintains permanent liaison in the
execution of personal security operations.
TEAM COMPONENTS

They are responsible for:


The immediate protection of the protected person, occupying at
all times the position indicated by the crew chief or the one they
consider appropriate depending on the situation at hand, with the
aim of keeping the area close to the protected person monitored
and controlled.

GPE School [Link]


BASIC ORGANIZATION AND POSITIONING

THE MOST COMMON COMPOSITION USED BY ESCORT SERVICES ARE:

SECURITY CHIEF

-Plan, organize, execute,


supervise and control.
HEAD OF

GPE School [Link]


OPERATIONS -HR and material resources.
-Develop operational plans.

APIE AND/OR VEHICLE


SECURITY ESCORTS
PUBLIC CONTROL OPERATION

> During certain public events (ceremonies, rallies, scheduled


activities, etc.), it is common for the personality, sometimes
spontaneously and other times by predetermined means, to address the
public to shake hands with those attending, finding themselves in a
situation of maximum risk, due to the existing physical
contact and the impunity provided by hiding among the
crowd of potential aggressors, which can favour the
commission of criminal acts against the physical
integrity of the protected person.

GPE School [Link]


P The protectors will be positioned around the protected
person taking into account the following rules of action.
> Permanent observation of the public's hands and eyes.
> Selective detection of possible suspects.
· People who hide their hands.
· People in a nervous attitude.
· People carrying bags, packages or bundles.
· People who want to push each other around.

GPE School [Link]


· People who, due to their attitude or clothing, are out of place with
the rest.
P In the presence of a suspicious individual, the escorts will stand
between him or her and the protected person until the danger zone
has passed.
EMERGENCY PROCEDURES

1. SOUND THE ALARM.


The protector who first observes the threat or attack must call out loud, indicating the
time position and, if possible, the type of weapons and/or attackers.
2. SURROUND THE DIGNITARY.
The protector closest to the aggressor or aggressors will neutralize
him/her, the rest of the protectors will surround the dignitary in order
to give him/her protection.
The team leader or the protector close to the dignitary will reduce the
silhouette of the dignitary by grabbing him by the waist and bending
his torso, placing his body on top of him. Under no circumstances will
he be knocked down, as this would make the task of evacuating him
more difficult.
3. EVACUATE THE DIGNITARY.
Once the silhouette has been reduced, an attempt should be made to
move the dignitary to a safer place out of danger, requesting that the
vehicle be moved for evacuation.
Under no circumstances should any agent go to the aid of the person
repelling the attack until the dignitary is safe. It should not be forgotten
that the responsibility of the crew is to keep the dignitary alive and not
to capture the aggressors.
DYNAMIC PROTECTION IN VEHICLES

Travelling by car is a risk factor, especially when it is used routinely


(same routes with usual times, etc.). We must not
forget that many of the attacks against people have
occurred when they were entering their car or
travelling in it.

GPE School [Link]


VEHICLE SAFETY TECHNIQUES

To obtain the appropriate levels of safety that allow us to make trips


with the guarantee that the case merits, it is essential to have a
perfect knowledge of vehicle safety techniques and
their practical application, as well as having cars
that meet certain technical design characteristics
and
security.

GPE School [Link]


VEHICLE FEATURES

- Vehicles used for protection of


personalities, must be designed and
constructed, taking into account the different threats
surrounding the person being protected, as well as the
technical procedures and weapons used by the attacking
elements, which will allow us to determine the level of
protection necessary to successfully abort possible attacks
or aggressions.

GPE School [Link]


VEHICLE INSPECTION

There are two ways to register a vehicle:

1. HORIZONTAL METHOD 2. VERTICAL METHOD

G
P
E
S
c
h
o
ol
C.
1. HORIZONTAL
METHOD

A. Previous Part : From the front bumper to the imaginary vertex (including the
wheels)
B. Middle Part : From the front windshield to the rear windshield.

C. Back : From the rear window to the rear bumper including the rims.

G
P
E
S
c
AVER h
FORMER AGE LATER o
ol
C.
2. VERTICAL METHOD

A. Upper Part. From the ceiling to the door glass.

B. Middle Part From the door windows to the vehicle floor.


Wheels, exhaust pipe etc.
C. Lower Part

HIGH
Yo
AVER
AGE
LOW
DRIVER CHARACTERISTICS

❖ A basic element in the protection of dignitaries are the th


drivers. In most cases, this staff lacks adequate training in e
protection, which can be an obstacle to achieving the
desired levels of security.

The main functions of drivers are summarized as


follows:
❖ Preventing things that may pose a risk to the protected
person.
❖ Act in the event of possible incidents, applying specific
techniques.
❖ Inspect the vehicle for two main reasons:
a) Detect and resolve minor faults.
b) Detect possible sabotage or intentional
anomalous manipulation of the vehicle.
❖ Know and coordinate with the escort the routes to
follow.
❖ Avoid hesitations that could cause the vehicle to
become immobilized.
❖ Apply defensive and offensive safety driving techniques.
LOCATION OF SECURITY AGENTS
INSIDE THE VEHICLE

The security agents are located inside the vehicle from front to
back and from right to left.
LOCATION OF SECURITY AGENTS
INSIDE THE VEHICLE
LOCATION OF SECURITY AGENTS
INSIDE THE VEHICLE

In the main vehicle, the team leader sits next to the driver on the
right side and the dignitary sits in the back seat on the right side.

► DRIVER

VIP • TEAM LEADER


LOCATION OF SECURITY AGENTS
INSIDE THE VEHICLE

But it may be the case that the executive Only count on a driver
bodyguard, in this case he should be placed

P
in the seat
back, right side.

” DRIVER-CUSTODIO

► VIP
SAFETY CAPSULES

A vehicle and a protector. In some cases, the guard, in addition to his protective duties,
also performs duties of driving the VIP vehicle. In this situation, the
safety parameters are reduced to a minimum and the safety device is
inadequate, since the reaction and evacuation capacity are greatly
reduced, while the level of prevention and protection is only slightly
maintained.
One vehicle and two protectors. Driving and safety functions
are generally shared. A higher level of prevention is achieved,
increasing the reaction and evacuation capacity, thus improving VIP
safety.
Two vehicles and three protectors. There are different possible
combinations, the most commonly used being that one escort carries
out driving duties for the main vehicle and the other two follow with the
protection vehicle.
SAFETY CAPSULES

Sometimes the VIP receives the protection of two or more vehicles in front and
behind, in this case the vehicle in front is called the hare and the one behind is the
escort, the distance from the hare to the main vehicle being 15 to 20 meters and the
distance from the main vehicle to the escort being 5 to 10 meters.

CAPSULE
Yo--------------------------------------------1

ESCORT VIP ESCORT OR DECOY


DRIVING TECHNIQUES

Driving techniques are based on knowing and mastering the characteristics


of the vehicle, to use them as an instrument of defense or attack,
depending on the operational characteristics of the vehicle and the nature
of the emergency.
Defensive or evasive driving. This term refers to all maneuvers aimed at
avoiding a barricade or obstacle on the roadway, without colliding with the
vehicles or materials that compose them.
There are three types of defensive maneuvers.
J-turn
U-turn
Y maneuver
Offensive Driving

This type of driving involves taking advantage of the


weight, power and speed of a vehicle to tackle an obstacle
directly, using the car as an instrument to overcome a
barricade or avoid immobilization.
The main offensive maneuvers are:

- Barricade charge.
- Barricade raffle.
- Lane blockage.
- Lane change.
- Turns.
- Stops at traffic lights.
CARAVAN OF VEHICLES

- A caravan is a group of official or private vehicles that, for security reasons,


circulate together on urban or interurban roads to transport a person from one
place to another.

- The caravans follow a predetermined route, which has been studied by the
members of the personal protection team, in order to establish the security
measures that are considered appropriate. Unscheduled routes should be avoided
as far as possible and routes should be known to both drivers and members of the
personal protective equipment.
There are two types of caravan.
□ Formal caravan.

□ Informal caravan.
Informal Caravan

- They receive this name when the itinerary that


travel, is only known by the personality, their collaborators and personal
protection equipment, in some cases the destination is
unknown.

- This type of caravan is used for regular trips, such as


work, meetings, restaurants, private events, etc.
Its main features are.
- Use of private vehicles.
- Confidential nature of the itineraries.
- Circulation of vehicles subject to traffic regulations.
- Need to vary schedules and itineraries, ensuring
confidentiality.
FORMAL CARAVAN
They are given this name when public routes are used, with the departure and
destination points known, for the movement of important dignitaries, within a
special security arrangement, generally of an official nature.

Its main features are.


- Special deployment of organization and security, with air cover, security
post and underground inspection.
- Use of connected optical and acoustic signals (flashlights, sirens, etc.).
- Circulation of vehicles not subject to traffic regulations to avoid traffic
disruptions during their transfer.

The number of vehicles in a caravan may vary, depending on the level of security
and the resources available, both human and material.
ITINERARIE
The study and analysis ofS itineraries is a fundamental technique to
ensure adequate levels of security in the
travel by motor vehicle.

It is based in establish, after a


prior recognition on the plan and the terrain,
thosetours that bring together the
optimal conditions security to carry out the
transfers, and which basically consists of.

Establish a main route, from the residence to the office


and vice versa, as well as to the places of usual
activities.
Provide alternative and emergency routes, which will
alternate with the main route at different intervals, as well
as various evacuation and escape routes to safety zones, in situations of imminent
ITINERARIE
danger or risk.
S
Preferably use wide roads that allow for quick travel (highways, motorways, two-way
streets). etc. ).
Know the location of security zones and possible evacuation points (police stations,
health centers), along all routes to which the protected person must be evacuated,
in case of emergency.
Reduce movement through those points that, due to their characteristics, may pose a
risk situation.
In anticipation of any contingency that may arise to present
themselves
transfer of a personality and in order to determine the possible areas at
of
vulnerability in an itinerary, we will take into account the following criteria.
Maximum area of vulnerability
Space and time + Entry into the Vehicle + Acceleration
It is the space and time from when a person leaves the door of his or her
residence, office or facility, enters the vehicle, starts moving and reaches a
ITINERARIE
speed greater than 20 km/h
S or until reaching the first crossing or
intersection where an alternative route can be selected to follow.
Vulnerable areas
These are those that cannot be avoided on a route because they are
obligatory passage points and therefore, susceptible to being chosen by
criminal elements for the commission of attacks against the protected person,
in addition to those places where, due to traffic conditions and/or the direction
of traffic, it would be easy to isolate the vehicle by means
of a blocking action (ambush). They will usually be
narrow one-way streets.
To enhance security in these areas, it is essential to
BREAK THE ROUTINE, that is, to substantially modify the
time slot for exits/entrances, by more or less 15 minutes as
a minimum to achieve adequate security levels.
Explosives
VULNERABLE POINTS

TRAFFIC LIGHTS
Attackers set up observation and surveillance posts.
CROSSING STREETS WITHOUT TRAFFIC LIGHTS Hiding and evading attackers.
NARROW STREETS / ZEBRA CROSSINGS Slow traffic, accident/breakdown simulation for armed
HIGH TRAFFIC DENSITY action, explosives inside vehicles.
STREETLIGHTS, SEWERS, CONTAINERS OF Easy blocking of vehicles/explosives.
TRASH, MAILBOXES, ... Armed action with firearms by blocking vehicles.
BUS STOPS, TELEPHONE BOOTHS, KIOSKS...
TUNNEL MOUTHS
WORKS ON PUBLIC ROADS, VEHICLES
ACCIDENTED OR UNDER REPAIR HINDRING
TRAFFIC

Ltd
VEHICLE IN DOUBLE ROW

OTHERS (Obligatory passage points)

BECAUSE?

Stopped vehicles
Slow traffic / facilitates the attack by simulating a traffic
accident.
Easy blocking of the vehicle by pedestrians.

Slow traffic and/or stopped vehicles


VIP BASIC INFORMATION
This information is handled confidentially by the Head of Security.

Description and location of facilities (residence, workplace(s), others).


Representative positions at the business, political, social and institutional levels.
List of main professional or social activities (work, sports, attendance at cultural events,
others).
People close to the protected person, such as secretaries, drivers, domestic service,
employees, etc.
Vehicles and means of transport commonly used.
Safety devices current (resources humans, media technicians,
operational protection procedures).
Physical and identification characteristics of the protected person, inclusion of a
fingerprint record, signature record and archiving of manuscripts. Personal data sheet.
Medical history, stating treatments and medication, where applicable, and list of physicians.
MAIN CONSIDERATIONS OF
PROTECTION
Active and
Passive Protection

Residence Place
Habitual or and activity
of
occasional Job

Social Travel
Activity on foot or
by vehicle

ActivityPoli
tical VIP's
Health
orHOME
It emerges as a target for possible actions for two basic reasons.
MAIN CONSIDERATIONS OF
PROTECTION
• The home is the center of the private activity of the VIP and his family.
- It is an easy point to locate and its occupants constitute a vulnerable target.

Most of the usual activities take place from the residence; the manager has to leave and
come back, the children have to go to school and come back after school, etc. The stability
that a home represents allows criminals to determine the main movements and activities of
residents, as well as the design and construction characteristics of the building, which will
allow them to evaluate the time and place of maximum vulnerability.
Essentially the attacker will assess residential vulnerability based on
the following factors.
- Location, type of housing, residents and domestic staff, habits, etc.
- Security of the building and surroundings.
DISPLACEMENTS

These are usually carried out in motor vehicles, except for certain trips where, for
professional or private reasons, other means of transport are used.

The vehicle and its use by the VIP. It is a target for several reasons.

It constitutes an easy target for attack.


The use of the vehicle is routine.
When the vehicle is in use, it is isolated from all safety equipment, except for those of the
protective team. The mobility and frequent use of the vehicle provides attackers with a
number of options for location, mode of action and time of attack.
The attackers will try to outnumber the occupants of the vehicle.
A car is easy to follow, if there are enough people, vehicles and
communications.
ANALYSIS OF RISKS AGAINST THE DIGNITARY

Risk is said to exist when its useful definition of a security control. A


problem requires three aspects to be evaluated: recognize
and
□ Risk identification: The types of threats and risks that affect the people
who need to be protected.
□ Risk assessment: The likelihood that these risks will become actual
threat instances.
□ Direct and indirect threats: Passive or active, direct or indirect threats
that threaten or attempt to threaten the VIP.

The relationship between the three aspects listed will be the fundamental
element for the adoption of active measures for the protection and
personal security of the Protected Person.
RISKS AGAINST THE DIGNITARY

V ATTACKS.
/ KIDNAPPINGS.
/ ASSAULTS AND ARMED ROBBERIES.
/ INDUSTRIAL ESPIONAGE.
/ EXTORTIONS.
/ THREATS.
/ ACCIDENTS.
> ACTIONS PRODUCED BY THE
NATURE.
/ ALTERATIONS OF ORDERPUBLIC.
> MINOR INCIDENTS.
ATTACKS ON PEOPLE

They are usually motivated by direct or indirect causes,


related to the protected person, may be of a terrorist or criminal nature.

With a firearm.
Armed action when leaving/entering homes, offices and
travelling between different workplaces and daily activities.
Using explosive devices.
Sending correspondence/packages containing explosive
devices.
Placing explosive devices in facilities.
Attaching or installing an explosive device to the vehicle.
Attacks with explosive devices on the route of displacement.
SECURITY DEVICES

The purpose of the personal security team is to


guarantee an optimal level of security around the VIP
in the different places where he carries out his
professional, political and private activities.
The aim is to ensure maximum performance and
productivity of operational protection personnel,
preventing risks, whether obvious or hidden.
HUMAN RESOURCES

Personal protective equipment must basically be


integrated,
by.
- Dynamic protection personnel.
- Static protection personnel.
- Advance and counter surveillance
personnel.

SERVICE COVERAGE
The types of coverage can be structured as follows.
Full coverage: 24 hours a day, every day of the week.
Daily coverage: 12 to 16 hours every day of the week.
Work coverage: 8 a.m. to 4 p.m. on weekdays.
Reduced coverage: periods less than 8 hours, working days.
Temporary coverage: for specific, previously determined trips.
Sporadic coverage: during the time and space for a specific situation.
VEHICLES
- We usually differentiate between two types of vehicles,
depending on their use by the personality or the escort
team.

□Main vehicle.
□Protection or escort vehicle.

- Other types of vehicles that can be used


by the aforementioned services are
motorcycles, which perform different
functions.
□ Reaction.
□ Advanced.
□ Caravan guide.
COMMUNICATION EQUIPMENT

Regardless of the availability of cellular telephone equipment, it is necessary to


have a radio communication network consisting basically of a base station as a
control and operations centre and portable communication equipment;
telephone interception and call tracking equipment must also be available.

In order to establish secure communications, members of the


security team can be provided with the most comfortable
model communication systems possible. It is recommended
that depending on the VIP's activity, he or she uses encrypted
communication equipment.

WEAPONS AND SPECIAL EQUIPMENT

Taking into account the legal aspects, regarding legislation on Private


Surveillance and Security and its regulations, the Law on Weapons
Possession and its regulations, it is technically considered necessary to
provide firearms to the components of the protection services for dignitaries, who meet the
following characteristics:
□ Easy portability and handling.
□ Functional and accessible mechanics.
□ Security mechanisms.
□ Firepower.
□ Double action mechanism, in handguns.

Other possible accessories, in addition to the standard weapon and its holster, are
bulletproof vests, which are recommended for use in high-risk situations. There are a wide
variety of models and levels of protection on the market. It is also advisable to have portable
explosive detection equipment and R/F inhibitors, which are suitable for use by the different
members of the protection circles.
COORDINATION OF SERVICES

□ Personal security encompasses dynamic protection and static protection, with


coordination between the different components that make up both services being of vital
importance.
□ To facilitate the coordination of these two services, it is necessary to organize a
communications system: keys and names, which allows us to ensure the confidentiality of
the messages to be transmitted. To do this, proceed as follows.
□ Each protection equipment (dynamic and static) will have a nominal identification.
□ The places to visit are grouped by activity zones and assigned a coded key.
□ Establish different codes for normal and emergency situations, such as entrances,
exits, arrival at other points, etc.
□ Define an agreed language. (use of Q code; phonetic alphabet or both)
□ As a general precaution, both the names and the keys used must be updated or
modified periodically.
DIFFERENCES BETWEEN A LONE ATTACKER AND AN
ATTACKER WHO IS A MEMBER OF AN ORGANIZATION

AGGRESSOR MEMBER OF AN
INDEX LONE ATTACKER ORGANIZATION

Gathering information for the Limited, he must remain close to He has support, means and
operation. his potential victim for a long resources, and will remain close to
time. his objective for a short time.

Way of acting. Unknown, random or virulent


There are characteristics based
without prior planning or
on experience and preparation.
organization

Evidence of planning and intent. Minimal possibility of exposure. Greater possibility of exposure.

Planning. Individual. Can involve others, runs drills.

Support for the operation. He doesn't have one. Has.

Reasons for carrying out the Resentful; social, psychological, An organization; by request,
operation. work-related, envy, of the politics, mafias or organizations.
individual Etc.
WAYS TO GET INFORMATION FROM A (NON-FRIEND)

OBSERVATION:
a. Open
b. Undercover
c. Camouflaged.
RECOGNITION ROUNDS.
FOLLOW-UP.
COLLECTION OF INFORMATION THROUGH A SOURCE.
BRIBES.
INFILTRATED WITHIN THE ORGANIZATION.
PHYSICAL LISTENING FROM WITHIN THE ORGANIZATION.
WIRETAPPING.
USE OF ELECTRONIC MEANS (spy equipment).
SECURITY GUIDELINES FOR THE PROTECTION OF
DIGNITARIES

1st.

V Apply common sense to all things


V Keep a low profile
V Do not advertise (reduce your social activity as much as possible)
V Politics of silence (see, hear and keep quiet)

2nd.

V Security in the offices


V Home security (electric gates, alarms, bars, grills, CCTV) { Vehicle
security
SECURITY GUIDELINES FOR THE PROTECTION OF
DIGNITARIES

3rd.

V Vehicle with Chauffeur / Bodyguard (2 functions) 4th.

V Vehicle with Driver and Bodyguard (2 techniques) 5th.

V Car with Driver and Bodyguard with 1 or 2 Security Cars (Capsule).


THE DRIVER OF THE VEHICLE
OF THE DIGNITARY OR SECURITY

PROFILE:

V Physically and psychologically fit


{ Adequate training
{ Manners
{ Safety knowledge
• Discretion beyond reproach
THE DRIVER OF THE VEHICLE
OF THE DIGNITARY OR SECURITY

The safety driver is required to have:


V Conductive capacity
{ Training
{ Experience
{ Skill
{ Ability and firmness to face
emergencies
THE DRIVER OF THE VEHICLE
OF THE DIGNITARY OR SECURITY

VIRTUE OF THE DRIVER:

• He is “deaf”, “blind” and “mute”.


• Never “heard anything”
• He never “saw anything”
• He never “talked about the VIP and his issues”
PROTECTION OF VIP CONFIDENTIAL INFORMATION
THE DRIVER OF THE VEHICLE
OF THE DIGNITARY OR SECURITY

Who wants the information?


Are you able to identify the threat?
How vulnerable are we?
Do we protect confidential or critical information?
How likely is it to happen?
Is someone “making comments” or “trying to get information” from
us?
What impact would it have if you provided information?
Do you know the consequences for you?
VIP SAFETY DRIVING

CONCEPT:

These are the attitudes, preventive measures, procedures


and reactions that every driver must
have in order to contribute to the
safety of a VIP.
VIP SAFETY DRIVING

KEY FACTORS:

• THE DRIVER
• THE VEHICLE, and
• THE STRATEGY
KEY FACTORS:

THE DRIVER
Key element par excellence, success or failure in safety driving
depends on it
VIP SAFETY DRIVING

• Skilled in driving
• Getting to know your vehicle
• Training continued
• Experience
• Decisiveness and firmness of character in emergency situations
A
M
B
U
S
H
VIP SAFETY DRIVING

KEY FACTORS:

THE VEHICLE

• Power
• Maneuverability
• Armor
VIP SAFETY DRIVING

KEY FACTORS:

THE STRATEGY

Those who commit attacks are based on:

• The surprise
• Detailed knowledge of the scenario
• Speed and numerical superiority
• Mastery and/or control of the situation

In this sense, the strategy must be aimed at controlling, overcoming


or saving the deadly tactics of criminals, terrorists, hostile groups or
other persons.
VIP SAFETY DRIVING

PREVENTIVE SAFETY MEASURES:

• OBSERVATION AND SURVEILLANCE


• INFORM
• COMMUNICATION WITH THE SECURITY AND/OR
VIP TEAM
• CAR CARE AND PERMANENT INSPECTION
• KNOWLEDGE OF ROUTES
• FIRST AID
• EMERGENCY / CONTINGENCY PLAN
VIP SAFETY DRIVING

EVASIVE OR DEFENSIVE DRIVING

CONCEPT:

ALL THOSE MANOEUVRES INTENDED TO AVOID BARRICADES


OR OBSTACLES ON THE ROADS, WITHOUT COLLIDING WITH A
VEHICLE OR OTHER OBJECTS.
VIP SAFETY DRIVING

OFFENSIVE DRIVING

CONCEPT:

THE PHILOSOPHY OF OFFENSIVE DRIVING CONSISTS OF


USING THE VEHICLE AS A WEAPON, TAKING ADVANTAGE OF
ITS WEIGHT, POWER AND SPEED TO FACE AN ATTACK,
DISMANTLE A BARRICADE OR AVOID IMMOBILIZATION,
TENDING TO THE COMMISSION OF AN ATTACK.
AMBUSHS

This is the favorite tactic for exploiting surprise; therefore, defense


against vehicle ambushes should be just as important as defense
against foot movements.

Preventive protection is better than reactive protection, however, even


taking into account that "it is better to anticipate", we must be prepared
to react against any ambush or attack by subversives or common
criminals.
TYPES OF AMBUSHS
Ambushes against vehicles are of two types:

1. Mobile Ambush (attack from a moving vehicle).

2. Fixed ambush (attack from a fixed position).


The greater the level of understanding and agreement between the
protective staff and the VIP, the smaller the “cracks” in security will be.

There must be cooperation from the environment at the established security


level.
The protection system should be adapted to the dignitary's lifestyle.
Possible reactions to various situations should be attempted and agreed upon
in advance, especially in the prevention phase. (Neutralization of interference
when carrying out Protection).
The limits of “Hidden Risk” must be defined.
ITEMS TO TAKE INTO ACCOUNT FOR THE
PLANNING A MOVEMENT
IN VIP SECURITY

1. Is the movement formal or informal?

2. Can you predict the time or route?

3. Is the route the shortest possible?

4. Does the executive movement provide maximum exposure?

5. Is there an alternate route available?


ITEMS TO TAKE INTO ACCOUNT FOR THE
PLANNING A MOVEMENT
IN VIP SECURITY

6. Where are the critical points?

7. What is the best route for evacuation in case of emergency?

8. Is there a safe area available?

9. Is it possible for the lead car to enter the safe area?

10. Where is the nearest medical unit and what is the best route to it?
she?

11. Are there any dangerous physical sites such as areas, floors, or soils in
poor condition, etc.?
ITEMS TO TAKE INTO ACCOUNT FOR THE
PLANNING A MOVEMENT
IN VIP SECURITY

12. What type of formation or protective movement will be most appropriate for
the movement?

13. Will support from base staff be necessary?

14. Will any coordination with district law enforcement members be needed?

15. Number, type and location of protective equipment

16. Is there direct communication between the escort and the command post?

17. Has been the protection escort trained, trained or formed on


protection for dignitaries?
ITEMS TO TAKE INTO ACCOUNT FOR THE
PLANNING A MOVEMENT
IN VIP SECURITY

18. Who is the escort assigned to the emergency evacuation of the


protected person?

19. How many people accompany the protected person?

20. Are you prepared to protect yourself?

You might also like