𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

✍ Scribed by Carolyn Mae Kim; Robert H Deatherage Jr


Publisher
CRC Press
Year
2021
Tongue
English
Leaves
268
Edition
2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding the basic concepts and rules that need to be followed in protective services, including what comprises good security practice. This Second Edition is fully updated to include new case scenarios, threat vectors, and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced, sophisticated schemes.

In the current world environment--while many military, security and law enforcement personal have received some type of training in protection operations--it is oftentimes very limited, as little as one or two weeks in some cases. Many times, such training received is incomplete with limited coverage of advance work, planning, route analysis, and threat assessments that would help direct protection team resources for surveillance, threat detection, and building security. Even for trained personnel, there are challenges in transitioning from operational environments to working in private sector security.

Security has always been a necessity for conducting business operations in both low- and high-risk, regardless of the threat level in the operating environment. Overseas, those with new ideas or businesses, can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States, people become targets because of positions held, publicity, politics, economics, or other issues that create unwanted attention to a person, their family, or business operations.

Security Operations, Second Edition provides an introduction of what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail. An equal help to those just entering the protection business or people and companies that are considering hiring a security detail, Security Operations is a thorough, detailed and responsible approach to this serious and often high-risk field.

✦ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Table of Contents
Acknowledgments
Author
Introduction
Chapter 1: Why Use a PSC Provider
Chapter 2: Providing Protection
Protection Strategies
Roles of a Protection Specialist
Primary Objectives
Fundamentals
Areas of Protection
Threat Levels
Chapter 3: The Client
Who Is the Client?
Ethical Considerations
Chapter 4: Security on a Budget
Chapter 5: Components of Protection
The Bodyguard (BG)
The Bodyguard as Part of a Protective Detail
The Stand-Alone Bodyguard
Advance Work
The Personal Security Detail (PSD)
Equipment Concealment Problems
Low Visibility Versus High Visibility
The Close Protection Team
Chapter 6: Composition of the Security Detail and Their Responsibilities
Terms and Definitions
Chapter 7: Knowing the Threat
Where Does the Threat to Us and Our Clients Come from?
Range of Threats
Internal Considerations
External Considerations
Needs of the Threat
Chapter 8: Risk Management
Risk Assessment and Reduction
Threat Assessments
Vulnerability Assessment
Risk Assessment (Combining It All)
Conducting a Risk Assessment for Security
Chapter 9: The Advance
Responsibilities of the Advance
Pre-advance Work
Time Constraints
Time Requirement Standards
Location
Threat Levels
Site-Specific Requirements
Other Considerations
Keys to Successful Advance Work
Chapter 10: Surveillance Detection Program
Types of Surveillance
Methods of Surveillance
Static Surveillance
Long Term Static Surveillance
Foot Surveillance
Mobile Surveillance
Technical Surveillance
Aerial Surveillance
Anti-surveillance Techniques
Counter Surveillance
Setting Up Counter Surveillance
Chapter 11: Awareness Levels for the Security Professional
Chapter 12: Situational Awareness
Tactical Mindset
Chapter 13: General Guidelines for PSD Operations
Chapter 14: Foot Movement Tactics and Techniques
One-Man Detail
Two-Man Formation
Five-Man Formation (Modified Diamond)
Five-Man Formation (Modified V)
Six-Man Formation (Diamond)
Foot Detail (Open)
Foot Detail (Close)
The Security Detail’s Mission
Be Professional
Adopt a Suitable Image
Have the Proper Mindset
Inform the Client of Potential Risk
Chapter 15: Public Venues and Functions
Public Speaking Venues
Reception Lines
Entering Elevators and Other Enclosed Spaces
Security Setup for Approaching an Elevator
Security Setup for Entering an Elevator
Security Setup Inside an Elevator
Chapter 16: Route Selection
Route-Planning Principles
Chapter 17: The Phases of Route Planning
Selection of the Route
Organizing the Movement
Hostile Environments or War Zones
Chapter 18: Moving the Client
Identify the Routes
Chapter 19: Motorcade Operations
Terms and Definitions
Vehicle Embus and Debus Procedures
Embus (Getting In) Considerations for Security
Debus (Exiting) Considerations for Security
Reacting to an Attack While Moving
Considerations
Things to Remember
What Could Go Wrong?
Choosing the Right Vehicle for the Mission
Armoring Vehicles
Armor: Steel Plates Added to the Doors
Armor: Additional Steel Plates and Kevlar
High Profile Vehicles
Comparing High Profile Vehicles to Other Vehicles
Convoy Equipment
Chapter 20: Car Operations and Tactics
Traffic Circles
Vehicle Reception of Two-Car Motorcade
Two-Car Moving Roadblock Escape
Two-Car Stationary Roadblock
Three-Car Operations and Tactics
Three-Car Turns
Lane Changes
Approaching and Passing through Intersections
Vehicle Reception of Three-Car Motorcade
Reacting to Attacks at the Embus/Debus Point
Chapter 21: The Counter Assault Team (CAT)
Mobile Role
Static Role
Mobile Operations Procedures
Static Site Operations
Chapter 22: Counter Sniper Operations
Counter Sniper Equipment
The Counter Sniper Team
The Firing Position
Control of the CS Team
Reporting SOP for the Counter Sniper Team
Location Reporting
Reporting Individuals
Reporting Vehicles
Chapter 23: Building Security Considerations
External Considerations
Internal Considerations
Other Considerations
Outer Layer Security
Inner Layer of Security
Deliveries
Conduct
Visitors
Random Security Checks
Other Security Details
Night Shift
Fire Safety
Indirect Fire
Bomb Threats
Temporary Site Security
Chapter 24: Building Searches
Route (Line of Advance)
Interior Room Searches
Appendix A; Types of Surveys
General Site Survey
Remain Overnight (RON) Site Survey
Airport Survey
Hospital Survey
Example General Site Survey
Example Facility Checklist
Example Remain Overnight (RON) Hotel Survey
Site Security
General Notes
Example Airport Survey
Example Hospital Survey
Basic Physical Security Checklist
Options for Vehicle Security
Options for Perimeter and Access
Appendix B: Vehicle-Oriented IED Search Checklist
Appendix C: Personalsearch Techniques
General Search Technique
Types of Search
Quick Body Search or Frisk
Conducting a Detailed Body Search
Always Remember
Appendix D: Route Survey Format
Route Details
Assets Required
Service Support
Command and Control
Any Additional Information
Appendix E: Security Detail Operations Orders
Visual Aids
Protection Orders Example Format
Situation
Mission
Execution
Service Support
The Delivery of Orders to Personnel
Conclusion
Appendix F: Observation
Suicide Bomber Indicators
Potential Props
Local Area Indicators
Individual Behaviors
Vehicular Indicators
Index
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W


πŸ“œ SIMILAR VOLUMES


Security 101 An Introduction to the Priv
✍ Joseph Jaksa πŸ“‚ Library πŸ“… 2016 πŸ› Carolina Academic Press 🌐 English

The concept of security and securing one's property and possessions dates back to the early centuries of mankind. Identified as a basic human need, we have an intrinsic desire to protect our self and our property. Today, in the United States, the private security industry is the largest employer in

Private Security: An Introduction to Pri
✍ Charles P. Nemeth πŸ“‚ Library πŸ“… 2018 πŸ› CRC Press 🌐 English

<P>There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry. <B>Private Security: An Introduction to Principles and Practice </B>takes a new approach to the subject of private sector security that wi

Private Security: An Introduction to Pri
✍ Charles P. Nemeth πŸ“‚ Library πŸ“… 2017 πŸ› CRC Press 🌐 English

There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry.<b>Private Security: An Introduction to Principles and Practice</b>takes a new approach to the subject of private sector security that will be

Private Security: An Introduction to Pri
✍ Charles P. Nemeth πŸ“‚ Library πŸ“… 2017 πŸ› CRC Press 🌐 English

There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry.<b>Private Security: An Introduction to Principles and Practice</b>takes a new approach to the subject of private sector security that will be

An Introduction to Derivative Securities
✍ Robert A. Jarrow, Arkadev Chatterjea πŸ“‚ Library πŸ“… 2013 πŸ› W. W. Norton & Company 🌐 English

<p><strong>The first real <em>introductory</em> text in derivatives.</strong></p> Written by Robert Jarrow, one of the true titans of finance, and his former student Arkadev Chatterjea, <em>Introduction to Derivatives</em> is the first text developed from the ground up for students taking the introd

Insider Risk and Personnel Security: An
✍ Paul Martin πŸ“‚ Library πŸ“… 2023 πŸ› Routledge 🌐 English

This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk. Some of the most problematic risks confronting businesses and organisations of all types stem from the act