EPM Student
EPM Student
● Used of initiative
● Be consistent
● Disrupt routine
● Used of common sense
● Improve awareness
● Maintain a low profile
● Individual responsibility
● Be aware of surveillance
● Used good communication
Personal Protection Barriers
Personal protection or barriers are procedural barriers used in much the
same ways as physical and technical barriers are employed to protect a house or
company facility. Every time a gate a parameter wall is lift ajar, or windows are
left unsecured, or the door to an inner safe haven is left open. The value and
benefit of that barriers is given away.
Personal protection barriers may not be made or bricks, mortar or solid
hardwood two inches thick, but they are barriers just the same. To carry
analogy further, relinquishing those barriers, so that threats posed to an
individual is increased.
So what are personal protection barriers? As an example consider the
following scenario;
A senior executive is enjoying an excellent meal at fashionable restaurant when
his dining partner looks ups with a strength expression on his or her face and
he feels a hard, metal object placed against the side of his head. He manages to
looks around momentarily and notices that the object is automatic pistol held by
man standing to one side. Conversation in the restaurant is subdued.
What could this incident mean in term of unnecessarily relinquishing barriers?
● The executive came to notice in the first place because he failed to
maintain a low profile.
● He lacked awareness because, although he obviously was the subject of
criminal planning including surveillance, he failed to notice it.
● He may have been aware of one or more threats, but as in the had
decided to ignore them
● He probably operated a fixed and predictable routine and stuck to
inadequate procedure
● He failed to notice the onset of the attack until the gun was place against
his head again lax procedures and lacks of awareness.
● Finally, he probably took no last ditch action when gun was pointing at
him, he failed to recover from surprise and maintain the initiative. When
fast aggressive action was called for, he sat there waiting for the
inevitable.
So personal protection barriers can include:
● Maintaining a low profile
● Utilizing awareness training
● Selecting a dominant and all- seeing position in restaurant
● Avoiding fixed and predictable routine
● Using initiative and common sense
● Recovering from surprise and maintaining the initiative
● Life Saving tactics
1. Military Training and Experience – Since you are hired as a body guard
mainly for protection, it is very necessary that your body guard as some military,
Police, or other security guard related experience will quickly adapt to working
with you and well easily perform his duties, which are majorly four -observed,
detect, deter and report.
The primary responsibility for the security and protection of staff members rests
with the host country. Senior United Nations officials can face an increased risk of
security incidents due to their potentially higher visibility and the fact that they are
often required to issue statements which may make them a focus for hostile
entities. Close protection is a viable tool to mitigate risk to the security and dignity
of United Nations officials.
The deployment of close protection except in the case of the President of the
General Assembly, the Secretary-General and the deputy Secretary-General will be
based upon a specific Security Risk Assessment (SRA) and for travel on official
business only.
The Protection Officers will therefore not engage in any activity which will
compromise their ability to achieve these aims or which could indeed contribute
towards successful attacks against the Protectee.
Direct protection is a custom made service which depends upon and is sensitive
to the full spectrum of factors considered in the risk management process.
In its smallest deployment, a Close Protection Unit comprises:
● One PPO assigned to the Protectee (BG).
● At least three Protection Officers acting in the Personal Escort Team (in
most of the formations developed below, the number of Protection
officers is four)
These officers will require two vehicles, one for the Protectee and PPO and one
for the PET. The drivers for these vehicles must be provided in addition to the Close
Protection Unit in this configuration.
From this basic package, the operational command will determine what type and
number of additional assets are required, particularly in the roles to be fulfilled by
the Protection Support Team.
The choice of foot formation will depend on the threat, the number of officers
assigned, and also the visual impact desired. Ea[ch formation has positive and
negative aspects, however all formations should include a ‘layered’ defense of
concentric rings with the PPO forming the most inner ring of security and Officers
of the Personal Escort Team providing at least one additional layer of in depth
security: Box, Diamond and V formations.
The position of each officer of the close Protection Unit is defined.
The Body Guard (PPO) is assigned directly of the protectee (VIP). In the event of
an attack or other serious incident, the immediate tactical response of the PPO will
be to take control of and extract the Protectee from the area of danger. The PPO has
the specific role of acting as bodyguard and should not be distracted from this duty
by also having the responsibility for delivering orders and coordinating the actions
of the Close Protection Unit. The Personal Protection Officer (PPO) assigned to the
Protectee will remain with the Protectee at all times and acts as the last line of
defence.
In the box formation, the 4 protection officers in the PET are taking position at
the corner of an “imaginary” box and have their own area of responsibility. The
Personal Escort Team (PET) provides a second layer of protection in close proximity
to the Protectee. When operating on foot, these officers will maintain visual and
verbal communication with the PPO at distances dictated by the environment.
When conducting a vehicle move, these officers will travel in an additional vehicle to
the convoy. In the event of incident on foot, the PET will respond to a threat where
necessary and provide cover during the extraction of the Protectee. In vehicle moves
where the Protectee Vehicle is mobilized and cannot self-extract, the PET will
provide all round tactical defense of the Protectee Vehicle, and thereby the
Protectee, whilst the threat and medical status are determined, and the extraction
is planned.
The box formation offers to the protectee a clear view in front of him.
The position of each officer of the close Protection Unit is defined.
In the diamond formation, the 4 protection officers in the PET are taking
position at the corner of an “imaginary” lozenge and have their own area of
responsibility. The Body Guard (PPO) is assigned directly of the protectee (VIP). The
diamond formation looks more aggressive to the crowd.
In the box formation, the 4 protection officers in the PET are taking position
following the lines of an “imaginary” V and have their own area of responsibility.
The Body Guard (PPO) is assigned directly of the protectee (VIP).
The V formation is very often used when the team and the protectee is passing
through a crowd.
Slide 15
Slide 15 low profile formation with two close protection officers. In some
countries, police officers don’t speak about close protection when the protection
team is composed by less than three members.
Slide 16
Slide 16 low profile formation with three close protection officers. This schema is
the most common system used by the French protection team.
slide 17
Slide 17 illustrates a low profile formation with four close protection officers. In
this case, one officer is fully dedicated to the Protectee and is in charge of his
extraction and evacuation
slide 18
It is important to note that the host country has jurisdiction in the event of an
attack and therefore assumes responsibility for any response. However, the
protection package must fulfil their responsibility in removing the Protectee from
the threat in accordance with relevant UN policies and procedures.
The primary role of Protection Officers during an incident is to extract the
Protectee to a safe haven. Safe rooms, hardened rooms or exits leading back to the
Protectee Vehicle must be located and reconnaissance made to determine their
suitability. Escape routes must be identified to each safe location.
For extended movement on foot, rally points must be identified along the route
That in the event of incident and the resulting confusion, the Protection Officers
can extract the Protectee, re-organise at clearly understood locations and
consolidate the team before moving on.
The close protection unit can be supported by a Quick Reaction Force or police
officers in case of visit in a sensitive area or presenting risks of incidents. The
positions of these support elements are described in the following slides from 19 to
22.
slide 19
slide 20
Slide 21
Slides 19 to 21 show the position of FPU members in case of support to foot
formations.
Slide 22 shows FPU members moving on the sides of a foot formation. This
tactic is principally used while escorting a delegation and when the public is
positioned on both sides of the road.
The communication in close protection is crucial and present at all steps of
direct protection, starting from the exit of the Protectee ’s office or house till his
return. Particular attention has to be paid during the phases of movement, by
foot, while embarking or disembarking, or in case of aggression.
As during public order operation, all means are used to broadcast information,
namely by radio, verbal, signs or eyes contacts. Communication should be discreet,
except in case of attack, when it is necessary to catch immediately the attention of
the whole protection team.
In this case, the officer who first faces any type of danger is in charge of
announcing it.
The announce aims to inform on :
• The nature of the danger
• The direction where it is coming from
In most of the countries, the direction is defined clockwise.
• 12h = danger coming from the front
• 3h = danger coming from the right
• 6h = danger coming from the back
• 9h = danger coming from the left
When the danger is announced, the protection team splits into two modules.
The first module “Fixation module” is in charge to response to the threat by
neutralizing the aggressor when necessary and possible. The second module called
“Evacuation module” is in charge of the extraction/evacuation of the Principal.
It is obvious that the two modules have to act/react in coordination, and that
one cannot achieve his task without the support/action of the other.
Slide 26 – 30
Slides 26 to 30 illustrate the role of these two modules.
FPUs are more and more requested to support close protection teams and to
provide with mobile protection. The role of these vehicles is not always well
understood and known by FPUs commanders and members. FPUs should be
trained accordingly prior their deployment within the mission area.
At the same time, FPU coordination should also be familiar with this type of
recurrent tasks. Massive arrival of VIPs occurred several times in the past in
peacekeeping missions. FPUs have to be able to fully integrate and sustain a close
protection operational plan developed by UN security without any problem.
Slide 33
Slide 33 is summarizing the different definitions in order to clarify the
terminology used in connection with the Mobile Protection Phase.
In addition to any terrorist or criminal threat to which a Protectee or other
protected asset is subject, mobile protection operations are also vulnerable to the
normal hazards of travelling by road.
The drivers of vehicles used in Mobile Protection, whether overt or covert, must
at all times drive according to the type and level of training they have received, and
remain responsible for the driving decisions they make.
Although speed of transit may be desirable in some operations, priority must be
given to ensuring the transit is completed safely for the Protectee, the general public
and for the Protection Officers themselves.
It is an appropriate requirement for all escort drivers to be properly trained in
“Defensive Driving Techniques” and only those properly authorized should be
used for this purpose.
Please refer to the FPU policy and the gradation of use of force to explain that
vehicles may constitute lethal force and that drivers are accountable for their
actions.
Responsibility for the manner in which vehicles are used rests with the drivers
who may have to justify their actions in legal proceedings.
Officers in charge of UN Mobile Protection should assess the specific
circumstances of each operation and decide upon a relevant protection strategy,
using the risk management process. This will enable other component elements,
including direct and static protection, to support the package in the most
appropriate and cost effective way and thereafter for the appropriate level of
resourcing to be deployed.
The movement by road of Protectee s need not always entail a formal escort. It
may often be more appropriate, subject to the risk management decision, for the
Personal Protection Officer (PPO) accompanying the Protectee to use a low profile,
covert approach with unannounced movements and discreet points of arrival and
departure. For example, for a Protectee at high threat but on private engagements,
it may be appropriate to provide a high security but low profile operation. In such
cases, if an Escort is required, the use of armed motorcyclists to facilitate progress,
without road closures or other high profile activities may be the most effective
measure. Alternatively, an entirely covert mobile operation may be preferable.
For a high security and high profile operation, a carefully managed and
coordinated
Escort including motorcyclists, supported by more heavily armed officers in cars,
together with an overt or covert counter assault capability and other tactics,
including decoys, may be required.
It is important that all officers engaged in the component parts of the protection
package are aware of the protection strategy and the risks giving rise to it. This
enables managers, event planners, and participating units to ensure that:
• Effective coordination can take place
• Resources are allocated and deployed appropriately
• The command structure is defined and understood
• Effective communications are arranged
• All participants are briefed effectively
In principle a convoy (which does not form part of a military convoy) should not
contain more than five vehicles otherwise it becomes unwieldy. Non-essential
vehicles not performing a specific task must be excluded. The practice of forming a
second, separate convoy with its own escort arrangements may be considered if
required.
Most convoys will consist of no more than four vehicles. Four is an ideal number;
fewer vehicles make it easier to identify the Protectee ’s car and thus contribute to
compromising the occupant. All vehicles should conform to the same performance
standard where possible.
All vehicles used should have four doors and depending on the threat should be
ballistically protected, including the windows, door panels and undercarriage. All
convoy vehicles should be fitted with front passenger rear view mirrors. Vehicle
engines should be kept running until a Protectee is secure inside a building and
should be started in plenty of time before the Protectee returns to allow it to reach
its normal working temperature.
Convoy vehicles should always be kept fully fuelled and in any case never be
allowed to fall below half half full exclusive of any reserve tanks.
Slides 37 and 38
Slides 37 and 38 are listed the different types of vehicles to be used during a
convoy (VIP escort/movement).
The role of each of them is developed in the slides 39 and 40.
The Point Car driver is for responsible ensuring the route selected remains clear
and travels at a distance in advance of the main convoy so that if a route is no
longer suitable the Protectee Vehicle can take an alternate route without being
forced to slow or stop. Traffic control if required is managed by the local police and
the Pilot Car should maintain communication with these authorities. The driver of
the Point Car alone is responsible for negotiating the selected route.
The Point Car travels well ahead of the convoy, controlling and managing the
traffic in front of it to ensure a non-stop journey or to notify the Convoy Commander
of any obstructions or blockages.
The Point Car officer is responsible for relaying the instructions of the Point Car
driver by radio to the Lead Car and for maintaining an accurate location of the Point
Car to both the Convoy Commander and the Watch Officer. The exact location of the
convoy in transit is of crucial importance, particularly in the event of an incident.
By being remote from the immediate vicinity of an attack on the convoy, the Point
Car will be best able to radio for assistance.
Lead Car
The Lead Car driver is responsible for the speed and position of the convoy on
the road. It is important that the speed of the convoy is such that it enables the
Point Car to manage the traffic safely and efficiently.
The Lead Car driver should follow the instructions of the Point Car and, by
watching the situation ahead and judging speed and distance, maintain a sterile
area around the convoy wherever possible.
The Lead Car officer is responsible for relaying the instructions of the Point Car
to the Lead Car driver. The officer must also remain tactically aware and alert to
any vehicles that may be attempting to interfere with or threaten the integrity of the
convoy.
The Lead Car is responsible for ensuring that there is enough room for the
convoy to move as one.
The Lead Vehicle will also carry national staff used for translation, coordination
with host country escort, vehicles and navigational support.
Protectee Vehicle
The Protectee vehicle is used to transport the Protectee and is driven by the
Protectee Driver. He should follow the instructions of the Lead Car and, by watching
the situation ahead and judging speed and distance, maintain a sterile area around
the convoy as required in accordance with the Operational Plan.
The Protectee Driver is also responsible for ensuring the smoothest ride possible
for the Protectee in normal circumstances, as well as the highest level of defensive
driving skills in the event of incident.
The Personal Protection Officer will travel in the Protectee Vehicle and is
responsible for providing cover to the Protectee, communication with the convoy
and preparing for the use of firearms and transfer to an alternate vehicle if the
Principal Vehicle is immobilised.
Pilot Vehicle
Where a convoy travels across unfamiliar boundaries a Pilot Car may be
provided subject to an appropriate threat assessment. The Pilot car provides:
• Enhanced communication within that area, and
• Detailed working knowledge of local routes and conditions.
Rear Vehicle
Rear Vehicles will be utilized only in high profile mobile security operations.
The driver of the Rear Car should maintain a sterile area to the rear of the
convoy in order to prevent encroachment on the convoy from that direction and
alert the PET Car to anyone attempting to do so.
The Sweep Car will also assist the main convoy by:
• Stopping to deal with any incident where immediate action is required such
as another convoy vehicle being involved in a minor traffic accident.
• Where a convoy vehicle is disabled or breaks down, the Sweep Car will
provide immediate replacement, thus preserving the integrity of the convoy
structure and function
Slide 41
FPUs may be involved in the security of several VIPs, provide UN security with
additional armoured vehicles for the escort and play a key role in securing the road
(advanced car, junctions…). The image of FPUs may also be seen more “less”
aggressive than an escort composed of military vehicles. The FPUs are taking part of
the convoy as PC or LC and RC or SC in most of the cases.
Slide 42
Effective communications within, from and to the convoy and with any Host
Country Escort are vital and need careful consideration as a key operational feature
of the protection plan. An effective solution to the communication structure is
potentially complex.
Standard radio channels may be heavily monitored by enthusiasts and others and
are therefore unsuitable for the transmission of confidential information. Where
communications depend on such systems, the maintenance of radio silence should
be observed, except in emergencies.
For operations where high security is required, the use of robust, reliable
encrypted systems is highly recommended.
In all communications, whether encrypted or not, it is important that venue and
road names are not given in plain language. Coded alternatives are recommended.
Where possible, all vehicles in an escorted convoy should have direct car-to-car
communications. The need is increased during high threat/risk operations where
ancillary vehicles may need to be excluded during the movement if intelligence is
received en route of a raised or imminent threat of attack.
Convoy Internal Communications
The benefit of a dedicated car-to-car radio channel within the convoy has been
clearly identified. It allows for the continuous flow of information required for
convoy cohesion and control as well as the ability to respond immediately to a
dynamic situation.
Communications with Venues
Radio communication with venues or points of arrival should be established
wherever possible. When a convoy stops at, or is in the final approach to, the point
of arrival, its vulnerability is greatly increased.
Real-time information or situation reports from the venue to the convoy will enable
the escort to manage the arrival efficiently and safely, hold off or abort the approach
if circumstances require and re-route to an alternative point of arrival.
Communications with other Areas
Where cross border movement occurs, links should be maintained with the original
communications centre until they are firmly established with the new area. This may
require the newly receiving monitoring station to communicate receipt of convoy
communications back to the original monitoring station after potential periods of
radio
‘dead spots’.
Slides 43 to 58
FPUs may be tasked to provide a VIP with an escort. In this case, FPU drivers
have to be aware of and familiar with the driving tactics used in order to prevent
any attack and provide the principal with adequate security.
Slides 43 to 58 show the movement of a convoy constituted by the Protectee
vehicle and the Protection Escort Team vehicle (FPU vehicle or not) in case of
overtaking by a third vehicle. In anticipation of an overtaking by an unknown
vehicle, the PET starts moving toward the middle of the road in order to protect the
PV.
At the same time, the driver of the PV moves to his right in order to facilitate the
manoeuvre of the driver of the PET vehicle. The movements have to be coordinated
and initiated upon order of the PET leader. The PET vehicle places itself between the
PV and the unknown vehicle in order to prevent from any attack.
The two vehicles return to their initial position after the overtaking.
After showing several times the movements of the vehicles, practical exercises have
to be proposed and executed.
Slides 59 to 74
After the case of mobile protection with one vehicle, slides 59 to 74 show the
movement of a convoy constituted by the Protectee vehicle and the Protection Escort
Team vehicle (FPU vehicle or not) in case of overtaking by a third vehicle. In this
situation, the LC and PET car move toward the middle of the road in order to
protect the PV. The driver of the PV initiates his movement to the right side of the
road upon order of the PET leader.
The vehicles in charge of the Protectee protection return to their initial position
after the overtaking.
After showing several times the movements of the vehicles, practical exercises
have to be proposed and executed.
Slide 75
Since it is likely that an attack will focus on the core of the convoy, i.e. Lead Car,
Protectee Vehicle or PET Car, the immediate radio alert will enable those not directly
involved to inform the relevant command centre, provide an exact location, give a
situation report and summon assistance.
This function will usually fall to the Point Car, but in the potentially confused
circumstances of a sudden attack, if not immediately undertaken by the Point Car,
by any officer able to make the broadcast.
Where an attempt is made by an attacker to halt the convoy, e.g. by a vehicle
driven across the route, this should wherever possible be skirted, allowing the
convoy to move on. If this cannot be achieved, ramming to remove the obstruction is
a further option provided:
• The circumstances can be fully justified
• The probability of removing the obstruction outweighs that of disabling the
ramming vehicle
• The Protectee Vehicle should not engage in ramming unless completely
unavoidable
During operations conducted in remote environments or in circumstances where
definitive care is expected to be further than sixty minutes from the convoy position
at any time, medical assets should be assigned to the convoy or staged at
predesignated points along the route. This may include host country or United
Nations medical assets.
Slide 77 - 85
Slides 77 to 85 illustrate the tactic to be used by the PET vehicle in case of attack
on the left side of the road.
The main objective is to protect the PV by placing the PET vehicle between the PV
and the place from where shooters are in action.
86 to 94 Slides
Slides 95 to117 illustrate the tactic to be used by the PET vehicle in case of
attack coming from the front of the convoy. The main objective is to protect the PV
by placing the PET vehicle between the PV and the place from where shooters are in
action. In this case, the PET vehicle overtakes the PV and stops its progression. Use
of firearms is done according to the principles of self-defence. Following this
manoeuvre, the two vehicles start moving backward. The PV is always under the
protection of the PET vehicle during the whole process.
Slide 18 -121
Slides 118 to121 illustrate the tactic to be used by the PET vehicle in case of
attack coming from the back of the convoy. The PET vehicle is already in position to
protect the PV. It keeps moving forward, and using force according to the principles
of self-defense.
Slide 122-125
Slides 122 to125 illustrate the tactic to be used by the PET vehicle or the Point
Car in case of roadblocks placed on the road. In this case, when feasible, the convoy
makes a U turn and moves in the opposite direction. Roadblocks may be used to
ambush the convoy. In case of presence of removable objects, the PET vehicle or PC
can be used as a hammer in order to remove the objects. The priority is here to
keep the convoy moving, without any stop that may put the Principal in danger.
Slide 126
Recent world events have demonstrated graphically the capability and intent of
terrorist groups to pursue their ends against static targets. While these horrendous
acts may be foremost in our minds it should also be recognized that other incidents
of criminal activity and events of public disorder can also have a serious impact on
United Nations security.
This reality has lead security professionals to increase awareness and introduce
effective counter-measures, such as personal protection, armed security guards,
restricted access and routine search regimes by properly trained staff at United
Nations premises and many other locations and buildings to which UN staff travel or
access.
What is required for all static protection operations is the proper application of
risk management together with sound, well thought out and effective protection
methods and principles.
Many of the static protection measures currently used by the United Nations
have been established and developed within the system over a long period of time;
in the current security climate however as the threat against its staff has become
more widespread and frequent so the United Nations is increasingly basing its
future security systems on knowledge gained from member states and their
contemporaneous experiences with international terrorism.
Methods to counter new threats from terrorism continue to be developed and the
United Nations must ensure that it always stays ahead of this challenge, or suffer
the inevitable consequences.
Static protection refers to an extensive range of available counter-measures,
applied at, outside or within perimeters to protect a person, activity or place from a
perceived threat. The threat may be from terrorists, criminals, politically disruptive
groups, fixated persons, self-publicists and lone adventurers.
Slide 127
Information Gathering
The foundation of any risk management process is the availability of
information. Information is made available to the United Nations through a
variety of means. It is essential that security practitioners have a complete
understanding of the need to collect or gather information, the recognition that
not all information has value, and that the collection of information within the
UN context is strictly for the safety and security of UN personnel and assets.
Information gathering is the key prerequisite for the risk management process,
effective operational planning and decisions on the command structure and
resourcing.
It is unlikely that first intimation of an event will provide enough information to
do anything but enable initial scoping for the event and indicate the type of
information which is likely to be required.
Effective information gathering will depend primarily on two main activities:
• Liaison
• Reconnaissance
Liaison
The importance of the role of liaison in planning for static protection
operations cannot be overstated. Virtually all static protection operations are
conducted in partnership with other organisations and groups whose active co-
operation is vital however, not always forthcoming.
The range of issues is potentially vast, but it should include anything which
provides and exchanges essential knowledge, establishes co-operation, promotes
clarity of aims and mutual expectations, such as:
• Identification of all stakeholders, their roles and responsibilities
• Details of organisational structures, and links between respective functional
levels i.e. policy, executive and service delivery levels of an organisation,
• Conditions that any stakeholders may impose,
• The circumstances under which an event will be discontinued and the
method and ownership for such decisions, and means by which this will be
communicated,
• The conditions under which a venue will be evacuated,
• Clarification of the role, powers (including armed response and the use of
force) and capability of security staff, either permanent or temporarily
contracted for the specific event,
• Copy lists of invited and confirmed guests, chronology of events, copies of
invitations, car passes and any other relevant materials, such as plans, maps
and contact lists, etc.
• Specimen copies of all staff passes and badges, etc Liaison with organisers
and partners should be seen as ongoing rather than as a one-time only
process and a suitable officer should be appointed to undertake the role.
Effective liaison ensures that each operation is flexibly tailored to its specific
needs and avoids the dangers which may stem from insensitive application of
an illfitting standard package.
Reconnaissance
The aim of reconnaissance is to gain a thorough tactical appreciation of the area
of operations, its inherent strengths and vulnerabilities. Maps and plans, no matter
how detailed, will not reveal the extent to which a venue is overlooked by
surrounding buildings, or trees that obstruct the view into or from a venue in
different seasons. During periods of conducting reconnaissance, as with all other
operational phases, Officers should carry out hostile surveillance detection
strategies, being aware that reconnaissance in itself may compromise operational
intent and planning strategies.
Urban street plans give no indication of topography, lines of sight or ambient
lighting, etc. Temporary environmental factors, such as the presence of scaffolding
or road work, can only be ascertained by recent reconnaissance.
Where possible, reconnaissance should be carried out on the same day of the
week and time of day as the proposed event to gauge the volume of normal
pedestrian and vehicular movement and assess the extent to which they are likely
to be affected or interfered with by static protection measures.
The use of a digital or video camera is recommended during reconnaissance to
assist in both planning and later briefing. These should be supplemented by aerial
photographs taken from relevant perspectives particularly in ‘High Risk’ locations.
An officer conducting reconnaissance of premises should, whenever possible, be
accompanied by a person intimately familiar with them, their access and through
routes, normal functions, occupants and contingencies, and the extent of existing
security arrangements.
Knowledge of works recently carried out in a building, or visits by external
contractors, should be sought in relevant cases. Local intelligence units should not
be overlooked as a potentially valuable source of information about factors affecting
a venue’s security.
Briefing
Briefing provides the vital link between those who planned the protection
package and those who will deliver it. Whilst general or joint briefings provide
necessary understanding of the context and structure of an operation, a specific
briefing on protection issues for those involved in delivering it must always be
carried out.
They should include the threat assessment in as much detail as the sensitivity of
the intelligence on which it is based allows. Full understanding of the threat will
enable individual officers to deal more effectively and appropriately with the
circumstances they encounter than information limited to a neutral statement of
the threat level.
Where the threat assessment is credibly supported by intelligence, the
commitment of those providing protection is likely to be enhanced if the intelligence
can be shared with them.
Where circumstances permit, briefing in situ should be considered. This will
improve tactical appreciation of the operating environment and the relevance of the
protection plan for those delivering it. Where this cannot be done, the use of good
quality photographs (including aerial), and clear accurate maps will serve as
acceptable alternatives.
A reminder of relevant legal powers may be appropriate during briefing.
Contingencies, and the circumstances which will initiate them, should be
explained fully.
Slide 129
The range of options is broad, but may include any combination of the following:
• Armed security, vehicle screening, patrols, providing deterrent high visibility
and capable of providing immediate armed intervention or support;
• Surveying, identifying and monitoring potential weapons launch sites for
mortar base plates (MBP) rocket propelled grenades (RPG) and man portable
air defence system missiles (MANPADS), according to the launch site profile
for each weapon type;
• Searches of car and truck parks for VBIEDs on or near an intended approach
route;
• Searches and vehicle checks in streets leading to the protected event;
• Host Country traffic patrol points to regulate, segregate and control
movement of vehicles towards a protected event;
• Discreet identification and research (ownership and occupancy, etc) of
buildings and other structures overlooking approach routes, venues or points
of arrival;
• Overt or covert observation of vehicles and pedestrians moving towards an
event
Intermediate perimeter may include:
• Use of uniform security officers, road signs or concrete anti-ram blocks where
necessary, admission ticket, points of entry and other vulnerable locations
• Establishment of a continuous visible line of demarcation, with tape, barriers
or fencing, to distinguish clearly to those approaching a change of status
between controlled and uncontrolled space. Where instituted, a demarcation
line must be staffed appropriately to maintain its integrity and deal as
necessary with infractions;
• Use of appropriate signs and information boards should be considered where
this will assist individuals to know what is expected of them and to reinforce
a perimeter.
In the inner perimeter, search of an appropriate type or combination of types
before the event should be carried out in order to detect, remove or disable a device,
weapon or harmful substance concealed in advance for use during the event. Once
searched, the area must be kept sterile.
• Take control of the perimeter and place personnel to keep the area secure.
• Escort the Protectee
• Secure and control all escape routes from the venue
• Secure all areas that the Protectee might move to be placing covert personnel
there
• Set up and secure a safe haven or holding room within the venue
Slide 132
The overall security of a protection operation depends largely on how well the
advance team searches the venue during the operational advance phase. The
team must allow enough time for a through unrushed search, with consent from
the owner of the premises or a designated representative.
The advance team must know what they are searching for. They must be able
to locate and recognize anything that may pose a threat to the Protectee, for
example explosives or electronic devices. Once the advance team has searche an
area, the area must be secured.
The three basic rules for searching the venue are as follows:
• Search from outside to the inside
• Search from the bottom to the top
• Investigate all possible hiding places and articles
Slide 135
The officers should be given a summary of the key points of the lesson before
being asked if they have any questions.
LESSON 4
DEFENSIVE DRIVING TECHNIQUES FOR EXECUTIVE
PROTECTION
Depending on the threat level and available resources, you should also
consider:
1. Engine run on protection
2. Armouring
3. Self – repairing fuel tanks
4. Full air filtering system
Ensure You Have the Correct and Most Appropriate Vehicle for the Journey
Vehicle security
Vehicles use by Close Protection Terms must kept in a secure lock up when
not in use by the driver. If the vehicle is left unattended at any time the driver
must conduct a full search of the vehicle before setting off. When arriving at a
venue the driver must stay with vehicle to ensure that no device can
Attached to the vehicle to ensure that no device can be attached to the vehicle.
If possible an IED Detector should be placed under vehicle.
1. Searching of the vehicle must be one of the teams SOP’s and must be
conducted at the start of every day by two team members following a set
searching routine
2. When parking the vehicle at a venue you must not nosy park. The vehicle
must be ready to move at all times.
3. The driver must remain alert at all times when travelling or parked at a
venue and must always lock the doors when travelling in the vehicle
4. Also consider extreme weather conditions and weather or not a 4 wheel
drive vehicle would be most appropriate?
Risk assessment implications with regards to the use of vehicles
With every form of transport the risks such as speed, unforeseen traffic
jams and breakdown vehicles can become a large target and where possible
driven at speed however all drivers must stay within the law and abide by the
Highway Code. You must remember you are not the police and you cannot run
red lights
The need for alternative transport plans
When considering the use of vehicle you must ensure you have a backup in
case there are problems with travailing by board, it may be safer and quicker to
fly and have vehicle at the destination airport to get your principal to his
meeting. Consider the use of hire vehicles and the use of a chauffeur when
considering the use of hire vehicles book three vehicles and only use two this
gives you some form of security.
WHAT IS TACTICAL DRIVING?
Tactical driving can be described as a:
“Two-car Close Protection Team applying road craft, safe driving and tactical
positioning to safety convey their Principal between locations.”
Principals of Tactical Driving: C.O.A.T.S
Communications
Observation
Awareness
Teamwork
Safe driving practice
Speeding:
“Police tolerance for Speed- 10%+ 2mph but this can vary, so beware of average
speed cameras.”
Remember that you are not immune from the laws of the road and will be
prosecuted for speeding or reckless driving just like any other road used.
Even if the AC is not working your windows should remain closed at all times
due to the obvious raised threat that requires an armoured car in the first
instance. If you were stopped suddenly in an ambush, even a window open one
inch would render all that armour useless when the muzzle of a weapon is
pushed through it, fires a shot and that bullet then does an impression of a
Pin-Ball machine, bouncing off all the armour inside killing
everyone…..TWICE!.
Wearing of Seatbelts
Dead simple; The principal, his BG and driver should ALL WEAR
SEATBELTS. There are still two schools of thought on this that persist, to
which I answer with one high profile example where failing to wear a seatbelt
resulted in a huge failure in Close Protection;
“PARIS 1997, PRINCESS DIANNA”
The only exceptions to this rule, is if you are;
1. In static or very slow moving traffic with the chance of being ambushed
2. Slowing down for the drop off.
CONVOY DRIVING
Some convoys are seemingly ridiculous such as the President of the United
States or POTUS as he is referred to by his protection team of 2000! When he
was President, GW Bush visited the UK and was collected by a twenty five
vehicle convoy…… and that was not counting the outsiders!
I very much doubt many CPO’s will get to ride in protective convoys that
big. The convoy, even if it only consists of two vehicles is the preferred way to
travel on the civilian circuit, with three, four and five vehicle formations
preferred I Iraq and Afghanistan.
Where should the Principal be in the convoy?
If the Principal is employing a PES and they have a backup car they should
always travel behind the Principal’s vehicle, as this is the best position to take
Defensive measures should the convoy come under attack. If attacked from the
rear they are already there. If attacked from flanks they can quickly overtake
or undertake to place themselves between the threat and the Principal’s car
(Blocking).
If the attack comes from the front then they can overtake and take the threat
on from the front. So, in a two vehicle convoy the Principal will always be in
the front vehicle. Some might argue that he should travel in the rear every now
and then to keep the bad guys guessing, but this is wrong. The escort vehicle
is severely hampered in its responses to attacks should they come from
anywhere other than the front.
In a three car convoy, the Principal can be in the middle vehicle which
affords him all round defensive cover and in a 4 vehicle convoy the Principal
can be in either the second or third vehicles
Some may now argue that in a three of four vehicle formation that the
Principal can be in the front vehicle, which would unnecessarily reduce the
protective capabilities of the team by optioning out of all round protection.
Two car drills
The most common protection convoy consists of just two vehicles. For the
reasons stated earlier, the Principal will be in the lead car with the PES behind,
with the Principal driver always being aware of the PES’s position. He will never
pull into a line of traffic if there is not room for both him and the PES car.
Likewise, he will never pass through traffic lights if it is on amber or about
to change cutting him off from the PES. The need for awareness and
concentration is paramount for the lead driver!
When a PES driver trusts the lead driver, he will always follow; i.e. if the
Principal’s vehicle is turning right then the PES will always go with him, often
only looking at the offside traffic, knowing that the other driver wouldn’t have
gone without it being clear on the nearside
The lead vehicle must ensure that he positions himself with regard to giving
the PES good visibility of the road instead ahead. This means that he will be at
a different positions on bends and junctions to if he were a single vehicle with
no PES. At junctions he will position himself so as to make it easier for the
PES to provide cover for them. This cover is both from live traffic or an attack
of some kind.
NB:
Even if the lead vehicle takes different turn to that of the pre-agreed route,
then the PES must still follow and offer protection. There may be a very good
reason for this ‘wrong’ turn, and even if it just an error, the BG can always
pass this off to the Principal as Anti-Surveillance’ manoeuvers !
Obviously, if the driver has turned down a dead end, the use your common
sense and hold the junction for him to turn around.
VEHICLE ANTI AMBUSH DRILLS
Although the most vulnerable part of a journey is the start and finish, many
incidents have occurred when the VIP is travelling between these two points.
These incidents were possible to plan because of weaknesses in drills. This
chances of being ambushed can be greatly reduced by the careful selection,
planning and security of routes and things before the journey
“Remember to present a “HARD TARGET” at all times by maintaining
concentration and professionalism whilst practicing slick well-rehearsed
drills”.
Whenever you are giving this subject on a team task or advisory, or you’re
receiving it to practice drills as part of an operational team, it is the
culmination of a large amount of time on the training area
It is important to look objectively at the makeup and layout of the convoy,
the threat and the VIP in order to practice realistic and viable drills
Inevitable training area limitations make these drills the hardest to practice
realistically so there must be some preconceived role play to determine the
situation after the ambush is sprung
AIM:
The aim of this lesson is to instil the principles of anti-ambush, discuss the
main options and outline basic vehicle anti ambush drills.
VEHICLE ANTI AMBUSH DRILLS- CASE STUDY
THE MOVING ATTACK
In order to discuss offensive driving techniques associated with protection of
public figures, it is first necessary to become acquainted with the modus
operandi (MO) of the attackers. A cross-section of vehicle assassination attacks,
ranging from the gangland killings to South American terrorist group
assassinations, was studied to determine the pattern of the typical attack and
the specific vehicle tactics employed. A summary of key points identified in
these case studies appears below:
In most cases studied, the attack was carried out by employing two vehicles.
One vehicle was employed to impede or cut off the target vehicle; the other
vehicle was employed to launch the attack itself. For example, in one instance
an attractive girl in a Volkswagen passed the target vehicle’s progress. As the
second attack car moved into position alongside the target vehicle and the firing
began, the girl accelerated away and turned into a side street. In general, the
attack vehicle held three persons; a driver, a man in front with the driver, and a
man in the right rear seat. Both passengers usually brought weapons to bear
on the target vehicle during the attack. The impeding vehicle frequently held
only the driver.
77