
Security Operations
An Introduction to Planning and Conducting Private Security Details for High-Risk Areas
- Available for pre-order. Item will ship after June 16, 2021
Preview
Book Description
Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding the basic concepts and rules that need to be followed in protective services, including what comprises good security practice. This Second Edition is fully updated to include new case scenarios, threat vectors, and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced, sophisticated schemes.
In the current world environment--while many military, security and law enforcement personal have received some type of training in protection operations—it is oftentimes very limited, as little as one or two weeks in some cases. Many times, such training received is incomplete with limited coverage of advance work, planning, route analysis, and threat assessments that would help direct protection team resources for surveillance, threat detection, and building security. Even for trained personnel, there are challenges in transitioning from operational environments to working in private sector security.
Security has always been a necessity for conducting business operations in both low- and high-risk, regardless of the threat level in the operating environment. Overseas, those with new ideas or businesses, can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States, people become targets because of positions held, publicity, politics, economics, or other issues that create unwanted attention to a person, their family, or business operations.
Security Operations, Second Edition provides an introduction of what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail. An equal help to those just entering the protection business or people and companies that are considering hiring a security detail, Security Operations is a thorough, detailed and responsible approach to this serious and often high-risk field.
Table of Contents
ACKNOWLEDGEMENTS
INTRODUCTION
CHAPTER 1 WHY A PSC PROVIDER IS HIRED
Protection Strategies
CHAPTER 2 PROVIDING PROTECTION
Roles of a Primary Objectives
Fundamentals
Threat Levels
Who is the Client?
CHAPTER 3 THE CLIENT
Ethical Considerations
CHAPTER 4 SECURITY ON A BUDGET
CHAPTER 5 COMPONENTS OF PROTECTION
The Bodyguard
The Bodyguard as Part of the Protective Detail
The Stand Alone Bodyguard
Advance Work
The Personal Security Detail
Equipment Concealment Problems
Low Visibility Vs. High Visibility
The Close Protection Team
CHAPTER 6 COMPOSITION OF THE SECURITY DETAIL
Terms and Definitions
CHAPTER 7 KNOWING THE THREAT
Range of Threats
Internal Considerations
External Considerations
External considerations include:
Needs Of The Threat
Threat Operations Cycle:
CHAPTER 8 RISK MANAGEMENT
Risk Assessment and Reduction
Threat Assessments
Vulnerability Assessment
Risk Assessment
Conducting a Risk Assessment
CHAPTER 9 THE ADVANCE
Responsibilities Of The Advance
A Sample Advance Questionnaire
Pre-advance Work
Itinerary
Time Constraints
Time Requirement Standards
Location
Threat Levels
Site Specific Requirements
Other Considerations
Keys to Successful Advance Work
CHAPTER 10 SURVEILLANCE DETECTION PROGRAM
Types Of Surveillance
Methods Of Surveillance
Static Surveillance
Long Term Static Surveillance
Foot Surveillance
Mobile Surveillance
Technical Surveillance
Aerial Surveillance
Anti-Surveillance Techniques
Counter Surveillance
Setting Up Counter Surveillance
CHAPTER 11 AWARENESS LEVELS FOR THE SECURITY PROFESSIONAL
CHAPTER 12 SITUATION AWARENESS
Tactical Mindset
CHAPTER 13 GENERAL GUIDELINES FOR PSD OPERATIONS
CHAPTER 14 FOOT MOVEMENT TACTICS AND TECHNIQUES
One Man Detail
Two Man Formation
5 Man Formation (Modified Diamond)
Foot Detail (Open)
Foot Detail (Close)
The Security Detail’s Mission
CHAPTER 15 PUBLIC VENUES AND FUNCTIONS
Public Speaking Venues
Reception Lines
Entering Elevators and Enclosed Spaces
Approaching an Elevator
Entering an Elevator
Inside an Elevator
CHAPTER 16 ROUTE SELECTION
Route Planning Principles
Selection Of The Route
CHAPTER 17 THE PHASES OF ROUTE PLANNING
Organizing The Movement
Hostile Environments/Warzones
Identify The Routes
CHAPTER 18 MOVING THE CLIENT
Terms and Definitions
CHAPTER 19 MOTORCADE OPERATIONS
Vehicle Embus And Debus
Embus Considerations
Debus Considerations
Reacting To An Attack
Considerations
Things To Remember
What Could Go Wrong
Choosing The Right Vehicle
Armoring Vehicles
High Profile Vehicles
Convoy Equipment
CHAPTER 20 CAR OPERATIONS AND TACTICS
2 Car Operations And Tactics
Making a 2 Car
Traffic Circles
Vehicle Reception
2 Car Moving Roadblock Escape
2 Car Stationary Road Block
3 Car Operations and Tactics
Making A 3 Car Turn
Lane Changes
Passing Through Intersections
Vehicle Reception
Reacting To Attacks
CHAPTER 21 THE COUNTER ATTACK TEAM (CAT)
Mobile Operations Procedures
Static Site Operations
Principles Of Use
CHAPTER 22 COUNTER-SNIPER OPERATIONS
Counter-Sniper Equipment
The Counter-sniper Team
The Firing Position
Control Of The CS Team
Reporting SOP
Location Reporting
Reporting Individuals
Reporting Vehicles
CHAPTER 23 BUILDING SECURITY CONSIDERATIONS
Outer layer Security
Inner Layer Security
Deliveries
Conduct
Visitors
Random Security Checks
Other Security Details
Night Shift
Fire Safety
Indirect Fire
Bomb Threats
Temporary Site Security
CHAPTER 24 BUILDING SEARCHES
APPENDICES
- Types of Surveys
- Vehicle oriented IED search checklist
- Personnel Search Techniques
- Route Survey Format
- Security Detail Operations Orders
- Observation
General Site Survey
Example Facility Checklist
Remain Overnight Hotel Survey
Airport Survey
Hospital Survey
Basic Physical Security Checklist
Options For Vehicle Security
Options For Perimeter And Access
General Search Technique
Quick Body Search Or Frisk
Conducting a Detailed Body Search
Protection Orders Example
Author(s)
Biography
Robert H. Deatherage, Jr. is a private security consultant and security professional with a career spanning over three decades. This includes a 24-year career in the US Marine Corps and US Army Special Operations with extensive Special Forces experience in communications, operations, intelligence, and anti/counter-terrorism including conducting/managing high-risk training and design, development, implementation/ presentation of lesson plans/materials, and instructional process management for the Antiterrorism Training Detachment, US Army Special Warfare Center and School.
Bob retired as the Non-Commissioned Officer In-Charge of the Antiterrorism Training Detachment, JFK Special Warfare Center and School. In this, he was responsible for training members of all U.S. Government agencies in Antiterrorism tactics, techniques and procedures to include anti-terrorism, defensive driving, threat, risk and vulnerability assessments with mitigation, physical security, surveillance detection, individual protective measures and other principals designed to increase the safety and security of US Personnel and installations operating in all environments.
Bob is a Certified Antiterrorism Force Protection officer Levels II and III with experience in leading, and developing, Security/Safety plans, procedures, and their successful implementation. He has led and overseen installation, operations and maintenance of physical security devices, integration of physical and cyber security, tactical response, and personnel safety in various industries that include Commercial Nuclear Power, New Nuclear power construction, Natural gas power plants, power transmission and distribution projects, and other infrastructure projects in multiple countries, including the United States.
Bob is an experienced intelligence collector and analyst for both signals and all source collection efforts in all operational environments worldwide. This in addition to being a published author on security subjects including Survival Driving, Security Operations, Terrorism Awareness. He holds a Master of Arts degree in Business and Organizational Security Management.