2nd Edition

Security Operations
An Introduction to Planning and Conducting Private Security Details for High-Risk Areas




  • Available for pre-order. Item will ship after June 16, 2021
ISBN 9780367688363
June 16, 2021 Forthcoming by CRC Press
256 Pages 53 B/W Illustrations

USD $74.95

Prices & shipping based on shipping country


Preview

Book Description

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding the basic concepts and rules that need to be followed in protective services, including what comprises good security practice. This Second Edition is fully updated to include new case scenarios, threat vectors, and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced, sophisticated schemes.

In the current world environment--while many military, security and law enforcement personal have received some type of training in protection operations—it is oftentimes very limited, as little as one or two weeks in some cases. Many times, such training received is incomplete with limited coverage of advance work, planning, route analysis, and threat assessments that would help direct protection team resources for surveillance, threat detection, and building security. Even for trained personnel, there are challenges in transitioning from operational environments to working in private sector security.

Security has always been a necessity for conducting business operations in both low- and high-risk, regardless of the threat level in the operating environment. Overseas, those with new ideas or businesses, can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States, people become targets because of positions held, publicity, politics, economics, or other issues that create unwanted attention to a person, their family, or business operations.

Security Operations, Second Edition provides an introduction of what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail. An equal help to those just entering the protection business or people and companies that are considering hiring a security detail, Security Operations is a thorough, detailed and responsible approach to this serious and often high-risk field.

Table of Contents

ACKNOWLEDGEMENTS

INTRODUCTION

CHAPTER 1 WHY A PSC PROVIDER IS HIRED

Protection Strategies

CHAPTER 2 PROVIDING PROTECTION

Roles of a Primary Objectives

Fundamentals

Threat Levels

Who is the Client?

CHAPTER 3 THE CLIENT

Ethical Considerations

CHAPTER 4 SECURITY ON A BUDGET

CHAPTER 5 COMPONENTS OF PROTECTION

The Bodyguard

The Bodyguard as Part of the Protective Detail

The Stand Alone Bodyguard

Advance Work

The Personal Security Detail

Equipment Concealment Problems

Low Visibility Vs. High Visibility

The Close Protection Team

CHAPTER 6 COMPOSITION OF THE SECURITY DETAIL

Terms and Definitions

CHAPTER 7 KNOWING THE THREAT

Range of Threats

Internal Considerations

External Considerations

External considerations include:

Needs Of The Threat

Threat Operations Cycle:

CHAPTER 8 RISK MANAGEMENT

Risk Assessment and Reduction

Threat Assessments

Vulnerability Assessment

Risk Assessment

Conducting a Risk Assessment

CHAPTER 9 THE ADVANCE

Responsibilities Of The Advance

A Sample Advance Questionnaire

Pre-advance Work

Itinerary

Time Constraints

Time Requirement Standards

Location

Threat Levels

Site Specific Requirements

Other Considerations

Keys to Successful Advance Work

CHAPTER 10 SURVEILLANCE DETECTION PROGRAM

Types Of Surveillance

Methods Of Surveillance

Static Surveillance

Long Term Static Surveillance

Foot Surveillance

Mobile Surveillance

Technical Surveillance

Aerial Surveillance

Anti-Surveillance Techniques

Counter Surveillance

Setting Up Counter Surveillance

CHAPTER 11 AWARENESS LEVELS FOR THE SECURITY PROFESSIONAL

CHAPTER 12 SITUATION AWARENESS

Tactical Mindset

CHAPTER 13 GENERAL GUIDELINES FOR PSD OPERATIONS

CHAPTER 14 FOOT MOVEMENT TACTICS AND TECHNIQUES

One Man Detail

Two Man Formation

5 Man Formation (Modified Diamond)

Foot Detail (Open)

Foot Detail (Close)

The Security Detail’s Mission

CHAPTER 15 PUBLIC VENUES AND FUNCTIONS

Public Speaking Venues

Reception Lines

Entering Elevators and Enclosed Spaces

Approaching an Elevator

Entering an Elevator

Inside an Elevator

CHAPTER 16 ROUTE SELECTION

Route Planning Principles

Selection Of The Route

CHAPTER 17 THE PHASES OF ROUTE PLANNING

Organizing The Movement

Hostile Environments/Warzones

Identify The Routes

CHAPTER 18 MOVING THE CLIENT

Terms and Definitions

CHAPTER 19 MOTORCADE OPERATIONS

Vehicle Embus And Debus

Embus Considerations

Debus Considerations

Reacting To An Attack

Considerations

Things To Remember

What Could Go Wrong

Choosing The Right Vehicle

Armoring Vehicles

High Profile Vehicles

Convoy Equipment

CHAPTER 20 CAR OPERATIONS AND TACTICS

2 Car Operations And Tactics

Making a 2 Car

Traffic Circles

Vehicle Reception

2 Car Moving Roadblock Escape

2 Car Stationary Road Block

3 Car Operations and Tactics

Making A 3 Car Turn

Lane Changes

Passing Through Intersections

Vehicle Reception

Reacting To Attacks

CHAPTER 21 THE COUNTER ATTACK TEAM (CAT)

Mobile Operations Procedures

Static Site Operations

Principles Of Use

CHAPTER 22 COUNTER-SNIPER OPERATIONS

Counter-Sniper Equipment

The Counter-sniper Team

The Firing Position

Control Of The CS Team

Reporting SOP

Location Reporting

Reporting Individuals

Reporting Vehicles

CHAPTER 23 BUILDING SECURITY CONSIDERATIONS

Outer layer Security

Inner Layer Security

Deliveries

Conduct

Visitors

Random Security Checks

Other Security Details

Night Shift

Fire Safety

Indirect Fire

Bomb Threats

Temporary Site Security

CHAPTER 24 BUILDING SEARCHES

APPENDICES

    1. Types of Surveys
    2. General Site Survey

      Example Facility Checklist

      Remain Overnight Hotel Survey

      Airport Survey

      Hospital Survey

      Basic Physical Security Checklist

      Options For Vehicle Security

      Options For Perimeter And Access

    3. Vehicle oriented IED search checklist
    4. Personnel Search Techniques
    5. General Search Technique

      Quick Body Search Or Frisk

      Conducting a Detailed Body Search

    6. Route Survey Format
    7. Security Detail Operations Orders
    8. Protection Orders Example

    9. Observation

 

...
View More

Author(s)

Biography

Robert H. Deatherage, Jr. is a private security consultant and security professional with a career spanning over three decades. This includes a 24-year career in the US Marine Corps and US Army Special Operations with extensive Special Forces experience in communications, operations, intelligence, and anti/counter-terrorism including conducting/managing high-risk training and design, development, implementation/ presentation of lesson plans/materials, and instructional process management for the Antiterrorism Training Detachment, US Army Special Warfare Center and School.

Bob retired as the Non-Commissioned Officer In-Charge of the Antiterrorism Training Detachment, JFK Special Warfare Center and School. In this, he was responsible for training members of all U.S. Government agencies in Antiterrorism tactics, techniques and procedures to include anti-terrorism, defensive driving, threat, risk and vulnerability assessments with mitigation, physical security, surveillance detection, individual protective measures and other principals designed to increase the safety and security of US Personnel and installations operating in all environments. 

Bob is a Certified Antiterrorism Force Protection officer Levels II and III with experience in leading, and developing, Security/Safety plans, procedures, and their successful implementation. He has led and overseen installation, operations and maintenance of physical security devices, integration of physical and cyber security, tactical response, and personnel safety in various industries that include Commercial Nuclear Power, New Nuclear power construction, Natural gas power plants, power transmission and distribution projects, and other infrastructure projects in multiple countries, including the United States. 

Bob is an experienced intelligence collector and analyst for both signals and all source collection efforts in all operational environments worldwide. This in addition to being a published author on security subjects including Survival Driving, Security Operations, Terrorism Awareness. He holds a Master of Arts degree in Business and Organizational Security Management.