We got you covered.
Home Blog Page 23

Networking in EP: The Long-Game Mentality

0
networking

This is a story on gradual networking and how it worked for me. Though it isn’t an EP-specific success story, it’s a great example of how it can REALLY work.

We were sitting there in the President’s office of the company we had been doing business with for about seven years. Our executive team was sitting with the company’s executive team, discussing a deal that would gross six figures for our small business. Not a bad place to be and not a bad discussion to have!

This deal resulted from numerous factors, not the least of which were countless hours of dedicated networking disciplines. Now, at the time, none of us really looked at it that way but allow me to explain what happened, starting around about seven years earlier.

Laying the Groundwork

I was a lead security officer at a major town venue with comprehensive experience working in and around nightclubs. De-escalation, come-alongs, report-writing, and diplomacy were just some of the skills I had acquired over the past several years in that role. But my ability to check, examine and recognize false identification (fake IDs) is what started this whole thing.

In my role, I was charged with overseeing all the nightlife outlets in the venue, one of which employed a young, hungry bus boy named Mike. Mike had much bigger aspirations than his current role.

While I was making a round one night, Mike approached me and explained that he was accepting a role at a new nightlife venue opening where he may be expected to check IDs. He asked me if I would give him some training on the different fakes that were out there. I happily agreed, and a friendship was born.

Some months later, Mike was at his new venue, and I was out of nightclub security. Instead, I had accepted a role with an independent VIP services company (think concierge with execution) that specialized in nightlife. We helped customers book clubs, shows, etc., and then met them at the venues to ensure they received exactly what they were promised. And with my already fairly broad network of club workers, which I had acquired through the years, I brought access this company needed.

One of the newest venues in the city was at the top of the request list for our company. It was exclusive. It was hot. And my buddy Mike worked the front door as a VIP host. His role was building a guestlist and securing table reservations for bottle service. Our relationship was about to take off. He had something we needed (access), and we had something he needed (qualified customers). It was mutually beneficial. Over the years, the relationship flourished along with us individually and our respective companies.

networking

Doing Kindness Over Mere Networking

The relationship that started seven years ago was based on one person showing authenticity and humility and another wanting to be valuable. It landed them in the President’s office discussing a deal that would greatly benefit the venue, my employer, our customers/clients, Mike, and myself. As a result, we all enjoyed a stronger relationship, more access, and more customers. It was a “no lose” situation!

“Craig, that’s a great story but it just sounds like you were doing business.” While that was true, eventually, it started with doing kindness. So let’s dissect what happened those many years ago.

Rewind

As a young kid (he was 21 at the time), Mike had a long-game mentality and displayed a load of authenticity and humility by asking for help on something he didn’t know was a key to his success. As he and I became friends and continued to grow that friendship, I watched his career blossom through several avenues, not the least of which was networking.

Mike and I stayed in touch, followed up, remained authentic, put the relationship first (because the business end didn’t always work), and remained valuable to one another AND our respective employers.

I can also confirm this was our individual behavior with any number of relationships, not just with one another. Also, our deals with each other didn’t start and stop every day or weekly. We knew the business wasn’t always going to work, as it often did not. But we had a long-game mentality around the relationship.

Those same disciplines also helped to guide my employer. The company did a lot of business in the nightlife space. Our gross revenue was USD10M+ annually for several years. And networking was no small part of that accomplishment. Our entire company engaged in it, from the CEO to the part-time hosts. We ALL networked.

Our company’s sales department consistently delivered customers to the venue Mike worked in and others all over town. Suffice to say, these outlets found it valuable. We provided value. And we were consistent. If we didn’t have customers each week for each venue (which was rare), you might have found one of our owners showing up to those spots in support. So it wasn’t always the money, but it was always the relationship. We all valued that over everything.

In Conclusion

As you can see, networking is a long game. It took seven years to get from the start to a six-figure deal that was just extra money. And again, that’s not how or why it started.

I’m not saying that the money didn’t figure in, but the relationships were a top priority. That was for Mike and me, our employers, and for our networks throughout the city.

I’m happy to report on the situation 17.5 years later. Though we have both left nightlife and done a bunch of other things in different cities, states, and countries, Mike and I still send birthday texts to each other. It’s always been about the relationship.

Mexico City Airport: Armed Agents in Unarmored Vehicles

0
armed agents

On October 15, 2021, two men on a motorcycle shot at a luxury but unarmored van during the Mexico City Airport attack. Eduardo Beaven — the owner of a prominent restaurant chain — was traveling as a passenger in the vehicle. Alongside him was his protection agent, who stood injured and was taken to a hospital in the Mexico City Observatory area. So, let’s explore more about armed agents in unarmored vehicles.

The abovementioned van received several impacts from bullets. Additionally, the assailant’s motorcycle underwent severe damage after being dragged several meters on the asphalt.

Using the vehicle as a defensive weapon, a skilled driver ran over and dragged the aggressors through the roundabout of Terminal 2 of the Mexico City International Airport. One of the criminals lost his life minutes after being admitted to the hospital for injuries he sustained.

The press reports also indicate that a firearm from the attacked vehicle repelled the aggression.

From this unfortunate situation, we can draw two important conclusions:

  1. The vehicle is the best weapon that a properly trained security driver can have.
  2. To reduce the risks of carjacking or any kind of attack during transportation, the armored vehicle is an essential tool that cannot be replaced by a firearm which — in an unarmored car — elevates the risks instead of reducing them.

Combating Erroneous Concepts

Having armed agents in an unarmored vehicle causes more problems than solutions, as we have seen in other cases, such are the 2021

  • attacks against the protective agent of Sergio “Checo” Pérez,
  • shootings in the exclusive Mexico City area of Santa Fe, and
  • the described Mexico City airport attack.

In these incidents, three protective agents were severely wounded together with one protectee. Yet, that is not all.

In March 2022, a prominent Mexican businesswoman was killed in a shootout. During the incident, her protection agents opened fire from her unarmored SUV at the checkpoint with armed personnel they considered unauthorized.

So only in Mexico — in just one year — we had four protective agents wounded, one protectee wounded, and one protectee murdered. All this happened due to the erroneous concept of having armed agents in unarmored vehicles.

Final Thoughts on Armed Agents in Unarmored Vehicles

Our fundamental task is to reduce the risks. As with the Mexico City Airport attack, so too with other similar incidents.

But suppose we base our operation on the use of firearms. That means that we consider a gunfight as a means to reduce the risks. But gunfight, by definition, implies elevation of the dangers. Hence, we cannot reduce the risks by elevating them. That is obviously nonsense. But, as we can see, the nonsense frequently applied in executive protection took many people’s lives.

Executive protection is a process of planning and logistics that aims to reduce the user’s exposure to risk — not to expose a client to shootings. The latter are frequently unnecessary as they put the principal’s life at stake. Each tool in executive protection has its reason for implementation within the particular operating system. Thus, we cannot use one tool to replace the other.

Many groups and organizations want to save money by trying to replace armored vehicles with armed agents — that is proven to be a fatal mistake. Only the right combination of different tools for each operation can reduce the risks to an optimal degree.

Real-Life Scenarios in EP: Local Security

0
local security

In our latest edition of real-life scenarios, we asked Ben Zeifman to talk to us about one remarkable event that had a major impact on his career. He decided to go in-depth on a topic that many practitioners find interesting: local security.

Ben Zeifman, Gavin de Becker & Associates

In a pre-pandemic world, I was assigned as the advance protector of a star-studded international event for a high-profile, world-renowned public figure was followed daily by paparazzi and fans seeking inappropriate encounters. We were to travel abroad to China for a large-scale public appearance. To say we had to get creative with movements, vehicle swaps, decoys, etc., to protect privacy would be an understatement. On that note, let’s discuss local security.

Months ahead of the big event, I was responsible for leading an advance team before the protectees were due to arrive in the country. We were facilitating our advance, which included

In the process, I was the only person representing our group from a security standpoint. However, I was partnered with our local security vendors and government partners with whom we have a solid working relationship.

We spent the vast majority of our time at the main event venue, where we anticipated tens of thousands of fans to attend. Think stadium and theater combined with a red carpet style arrival.

Locals reported this would be one of the largest gatherings they had seen in a while, and there was already a lot of excitement surrounding this visit. One request from the protectee was to be able to engage with and be personable with their fans upon arrival.

Time and Distance

According to Gavin de Becker’s book, Just 2 Seconds, 64% of assassination attempts occur in/around a car. Therefore, it was imperative that we create a secure arrival to include enough white space (free area around the protectee) for safe movements. If we can make more time and distance, we’re in a better position to prevent an attack or inappropriate encounter. This was my largest focus.

Our local security vendor spoke broken English. However, they instilled confidence in their abilities to assist with this large-scale plan. My vision was to create an alley with pedestrian barricades staffed by uniform security guards, which would allow the protectee a safe white space path to engage with their fans from their arrival in the vehicle, down the red carpet until entering the venue, which was roughly 100 feet.

We established a plan that any fan permitted within the barricaded pens would have undergone security screening for weapons. Before leaving the country, I sat down once more with our local security partners to review the operations order and sketch all appropriate diagrams. Everyone collectively felt comfortable with the plan that we outlined.

local security

Show Time

Two months later, we arrived back in China with the protectee for the event. While the protectee was secure in the hotel with the body coverage detail, I returned to the venue as the advance lead to conduct my final day-off walkthrough. After months of communication and planning with my local partners and their reassurance that our plan was executed perfectly, I felt confident about what I would walk into.

As I reviewed the plan once more with our local security partners, they informed me that fans had begun lining up 24 hours before the screenings with excitement to gain access to the arrival area. I could hear the roar of the crowds from inside my vehicle as I arrived near the site. I verified that security screening was in place and was going per our plan with fans already preloaded into the barricaded pens which we had previously designed.

Tens of thousands of fans lined a pathway as far as the eye could see, ready for autographs, photos, and interactions with my protectee.

Trust but Verify

As I stepped out of the car and into the secure space, I immediately realized something had to have been lost in translation. I noticed there were many more security guards than we had initially planned for. But, in the same breath, there were also many fewer pedestrian barricades. And by many fewer, I mean none.

In the weeks leading up to the event, my local partner continuously reassured me that the pedestrian barricades would not be a problem.

Finally, realizing there were none in place, I questioned him and quickly learned that his interpretation of pedestrian barricades was literal pedestrians serving as barricades instead of physical barricades blocking pedestrians. As a result, I looked at roughly 50 guards holding hands to hold back tens of thousands of eager fans.

Before my heart rate could settle, the coverage team indicated they were en route early and were roughly 30 minutes out from arrival. As we all know, in this industry, things will never go as planned. I knew I had to act fast. As I watched the crowds sway, I knew these poor guards were no match for the growing, anxious group. These “pedestrian barricades” would not hold my white space. It was time for some quick thinking.

The Solution

Grabbing my local security lead and the venue coordinator, I decided to alter our arrival plan and quickly pivot from our original arrival spot to reroute to what would have been our departure spot which was free from onlookers. With minutes to spare, I ran out to the road to flag down the motorcade and diverted them to the new location.

The body coverage detail instinctively knew to follow me without asking questions. Finally, we arrived, and the protectee exited the vehicle, confused and agitated as to why we were in an underground garage instead of making a public arrival to the fans as previously desired.

Without getting into specifics, I explained there was a heightened security concern and to “please follow me.” Over time, I had made enough deposits in the confidence bank for the protectee to not further question and to follow appropriately.

Through my advance, I knew there was a balcony on-site that would overlook the sea of fans below. There, the protectee could welcome the fans and interact from a safe distance.

As the protectee took to the balcony, I watched the white space below quickly collapse within minutes. The public appearance went off without incident. In fact, additional talent and their security teams elected to divert their arrival to follow suit instead of keeping with the original plan.

In Conclusion

When operating in diverse environments, there are often challenges to overcome. For example, as I conducted an after-action review — which is imperative — I learned that I relied too heavily on the belief that my advance plan was well thought out and executed.

Cultural misinterpretations led to large-scale complications. This detail took place before smartphones were a daily way of life. Now, when working through language barriers, it has become common practice to utilize these devices to help translate or even show photos of security equipment to ensure that no one can misinterpret any details.

Even the most thorough security plans require adaptation at times. So, it is crucial to trust your intuition, be flexible and be confident in your decision to deviate from your original plans as needed.

Attack on Argentina Vice President: What Happened?

0
attack on argentina vice president

This week saw an attack on Argentina vice president Cristina Fernández de Kirchner. During the assassination attempt, a 35-year-old Brazilian national approached her outside her home and pointed a gun at her head. However, officials and media say the attacker’s handgun had misfired, with the police quickly overpowering him within seconds.

When the assailant tried to fire it on Thursday night, it didn’t discharge. Although he did pull the trigger, the attack on Argentina vice president failed thanks to the pistol’s malfunction.

The attack on Argentina vice president is one more case in the series of attacks suffered by prominent world public figures in the last two years that demonstrates the severe crisis of traditional executive protection.

A radical change is urgently needed in the way of operating that prioritizes intelligence, counter-surveillance, early warning, and shadow agents in public events.

Ivan Ivanovich, WSO – Worldwide Security Options

Other Relevant Details: Attack on Argentina Vice-President

Cristina Fernández de Kirchner finds herself in the middle of a corruption trial. Thus, thousands of supporters rallied around her house when the assassination attempt happened.

Interestingly, several television channels broadcast footage of the attempt to kill the country’s vice president. Officials are saying that the situation is now under scrutiny by experts who are evaluating the capacity, propensity, and fingerprints of the attacker.

attack on argentina vice president

In addition, political analysts claim that he had used his social media accounts to express sympathies and support for far-right organizations. With allegedly a swastika tattooed on his arm, the attacker also apparently worshipped Nordic gods. In fact, a key trait of many far-right militants in Scandinavia.

Some connoisseurs of the local situation say that it makes sense that she would become a target of extremists. They see one of the reasons for this in her left-leaning policies.

After the attack, officials from Latin American countries and Argentinian opposition parties unanimously expressed solidarity with Cristina Fernández.

Finally, president Alberto Fernández — who isn’t related to the vice president — said the following: “We can disagree, we can have deep disagreements, but hate speech cannot take place because it breeds violence and there is no chance of violence coexisting with democracy.”

How to Develop Standards in Executive Protection?

0
standards in executive protection

As the famous quote asserts, “Without standards, there can be no improvement.” For some time, protection professionals have recognized the security industry was void of consistency and in dire need of standards in executive protection.

This is not to suggest that there aren’t books written and published by individuals on how to conduct EP operations. However, a book written from an individual’s point of view does not constitute a STANDARD. In many cases, books are written based on the experiences of the individual author, which can differ and be influenced by various factors.

For example, if an author’s experience is solely based on government operations, they may have received the best training. However, they may not have the same level of experience operating in the private sector. Another example is if an individual has worked exclusively in the private sector. Factors, such as corporate cultures and budgets, drive and influence those experiences.

Security organizations are also developing their own versions of “Standards” or “Best Practices.” Generally, these documents are developed without significant industry input and have little to no transparency. They also lack the needed third-party validation of creating, editing, and approving standards in executive protection.

There are EP training schools that assert to set a standard for EP education. However, it is vital to ask the following question:

  • How can they set a standard in the absence of one?

Most training schools operate independently without validating their teaching methods or content.

Whether it is a book, a self-proclaimed Standard, Best Practice, or training school, these are merely varying degrees of technique without industry input. This is not to say they are wrong, but they are unvetted by the industry.

What is a standard, and what makes it an industry standard?

What Makes a Document a Standard?

The American National Standards Institute (ANSI) defines a “standard” as: “A standard is a document that provides requirements, specifications, guidelines, or characteristics that can be used consistently to ensure that materials, products, processes, and services are fit for their purpose.”

“In layman’s terms, you can think of a standard as an agreed-upon formula for the best way of doing something.”

I would go further and add that a “Standard” is reasonable, repeatable/consistent, clear/understandable, measurable, and achievable.

standards in executive protection

What Makes a Document an “Industry Standard”?

A Standard is a document that has undergone a rigorous process of development, edits, and approval by a body of industry professionals. Also, it must pass thorough verification by an independent organization, such as ANSI, which validates the document development process.

Just a few of the items that ANSI validates per their ANSI Essential Requirements include:

Openness

Participation shall be open to all parties who are directly and materially interested in the activity in question. There shall be no undue financial barriers to participation. Voting membership on the consensus body shall not be conditional upon membership in any organization, nor unreasonably restricted on the basis of technical qualifications or other such requirements.

Lack of Dominance

The standards development process shall not be dominated by any single interest category, individual or organization. Dominance means a position or exercise of dominant authority, leadership, or influence by reason of superior leverage, strength, or representation to the exclusion of fair and equitable consideration of other viewpoints.

Balance

The standards development process should have a balance of interests. Participants from diverse interest categories shall be sought with the objective of achieving balance.

Consensus Vote

Evidence of consensus in accordance with these requirements and the accredited procedures of the standards developer shall be documented.

Written Procedures

Written procedures shall govern the methods used for standards development and shall be available to any directly and materially interested party.

Once a proposed standard is written, ANSI will validate the entire process. As part of the validation process, documentation is produced demonstrating how the procedures and requirements were followed, the level of transparency shown by the standards developer, as well as how objections were addressed.

Why Is ANSI Relevant for Standards in Executive Protection?

According to the ANSI website:

ANSI Roles

“ANSI facilitates the development of American National Standards (ANS) by accrediting the procedures of standards developing organizations (SDOs) and approving their documents as American National Standards (ANS). This process serves and protects the public interest since standards developers accredited by ANSI – and the ANS they develop – must meet the Institute’s requirements for openness, balance, consensus, and due process and adhere to ANSI’s neutral oversight, assuring that all interested parties have an opportunity to participate in a standard’s development.”

ANSI Introduction

“ANSI is not itself a standards developing organization. Rather, the Institute provides a framework for fair standards development and quality conformity assessment systems and continually works to safeguard their integrity. And as a neutral venue for coordination of standards-based solutions, the Institute brings together private- and public-sector experts and stakeholders to initiate collaborative standardization activities that respond to national priorities.”

“ANSI serves as a strong voice on behalf of the U.S. voluntary standards community, protecting and strengthening its impact domestically and internationally. Through its membership, partnerships, and diverse programs and activities, ANSI represents the interests of more than 270,000 companies and organizations and 30 million professionals worldwide.”

It is also important to note that ANSI does not allow competing standards. Therefore, suppose companies A and B are both ANSI-approved Standards Developers. And company A submits to ANSI a project to write a Standard. Then, company B must coordinate with company A. Company B would not be allowed to present a standard to ANSI on the same subject.

Why Is an ANSI-Approved Standard Important?

There are currently limited resources available to organizations/stakeholders in the areas of executive protection training and team evaluation. Without a rigorous standards development process, books, schools, and others are just considered “techniques” that cannot be applied to the assessment of teams by stakeholders.

Currently, only one ANSI-approved Standards Developer has submitted PINS (Project Initiation Notification System) to ANSI to create a Standard for Providing Executive Protection. That organization is the Board of Executive Protection Professionals (BEPP).

Presently, the BEPP has a Technical Committee, which comprises over 25 seasoned professionals, and a Working Group, which comprises over 100 industry-related professionals.

Both the Technical Committee and Working Group are in the process of creating the first proposed ANSI Standard for Providing Executive Protection. The BEPP also has registered 15 additional EP-specific standards with ANSI for future development. A list of those other topics can be found on the ANSI website’s Approved & Proposed American National Standards (ASD) page.

When Is a Death Threat a Real Threat?

0
real threat

In an increasingly interconnected and yet polarised world, in which the economy is in decline and the cost of living in many regions increases, it will be big business that the media blame. This blame culture in which the turnovers of global brands — along with the salaries and bonuses of the CEOs — are published incites real threat and greater hostility towards the senior executives of the world.

The hostility towards these executives and their families will create an avalanche of unwanted attention. The method of communicating that hostility will be varied. Yet, typically it will include:

The vast majority of that unwanted communication will be abusive and generally hostile. Still, how do those tasked with keeping them safe eliminate the noise and find the real threat?

The topic of how public figures, the prominent and the wealthy, are targeted has been subject to much academic rigour.

What is known is that there are clear indicators and patterns of human behaviour that can indicate an escalation of a threat. This subject should be vital to any professional tasked with protecting a principal. In this article, we will discuss some of the most significant indicators.

The reality is that many security professionals will be unaware of the real threat communicated to the principal, and there are two significant reasons for that.

Firstly, the person tasked with being the principal’s gatekeeper (the person who reads the communications received) is unlikely to be familiar with the threat indicators. Therefore, this person cannot alert the security professional to any concerns. In fact, truth be known, the communications of problems are likely to be dismissed as nonsense and deleted.

Secondly, very few security professionals are sighted on these indicators. Thus, they are equally unable to identify them.

Origins of the Methodology: The Real Threat

There are generally accepted to be eight behavioural indicators and several key linguistic ones. None of the indicators, individually or collectively, will guarantee that an attack is imminent. What they should do is draw attention to a particular individual from the masses that require additional attention. It is, in some regards, a triage system. Simply put, it enables those persons of concern to be then passed to a specialist for further investigation.

These indicators were initially identified during a research project known as the Exceptional Case Study Project, in which full and open access to 50 years’ worth of US Secret Service files was made available to the researchers with the task of operationalising their findings. As a result, their research has been added to by others who have either corroborated or added to their conclusions.

The Pathway to Targeted or Intended Violence

The people of concern are usually those who have become pathologically fixated, meaning that they think of nothing else from the moment they wake up until they go to sleep at night. Research has indicated that people who pursue the rich and famous pose a greater risk of death or severe injury to their targets than do terrorist groups or criminals and are often unperturbed by protective security measures.

Those persons of concern who pose a physical threat rarely just snap. Instead, they follow a process and become predators. The good news is that this process is referred to as the Pathway to Intended Violence. They leave clues.

real threat

They are driven by some form of grievance, which can be personal or ideologically motivated, such as activists. This is where their intent is formed. When their grievance fails to be resolved, and they believe they have exhausted all means of doing so, they form their violent ideation.

This is often leaked through linguistic indicators in their communications, and it is critical that both the protectors and the personal assistant are familiar with this. This second indicator is known as ‘end of tether’ or ‘last resort language’ and can be seen in their communications or social media posts. It can be seen as a sign of desperation or distress and examples of which include:

  • “You leave me no other option.”
  • “I have no choice.”

This indicator suggests that the person of concern is expressing that they must act, and they must act now. It is often time-imperative and a hugely important indicator.

Separating the Real Threat From the Noise

One of the striking facts identified was that with very few exceptions, those individuals who communicate threats directly to the principal don’t pose a physical threat. As a result, this indicator is often referred to by the term ‘Hunter and Howlers’ after wolves.

Those familiar with wolves in the wild will be aware that when you can hear wolves, they are communicating, and when they are hunting, they do so in silence. Whilst it might seem obvious that a person who plans to attack is unlikely to warn their intended target, it is still prevalent for security details to be increased on receipt of a direct threat. This is mistaken for two reasons.

Firstly, as has been stated, those who make such a threat rarely (if ever) attack. Secondly, the increased security has a byproduct of increasing the anxiety of the principal and their family.

The exception to this indicator is when there is a pre-existing personal relationship between the principal and the person of concern. This also includes the scenario where the person of concern is fixated on the principal and believes that there has been a relationship or could be one. In their mind, their delusions are real and must be treated as such.

Research and Planning

Because these people of concern are pathologically fixated, they spend a lot of time researching the target, their lifestyle and plans. Then, they will often make an approach, even engaging with the residential or perimeter security, craving proximity but also testing the security and identifying vulnerabilities.

Whilst many have significant mental illnesses, it would be a mistake to dismiss them as being ‘mad’ and unable to form a rational plan of attack. It is for this reason that briefings and debriefings are vital.

Identification

As has been mentioned, the person of concern will spend a significant amount of time conducting research. However, whilst that research will include their intended target, they also become fixated on previous attackers and assassins.

They will take both inspiration and learn lessons from their attacks, in some cases copying apparently insignificant details. For example, the book “The Catcher in the Rye” has been associated with several fixated attackers after John Lennon’s assassin, Mark Chapman, not only sought to change his name to the main character but was then found to be in possession of the book.

This was mirrored by Reagan’s attacker, John Hinkley Jnr, who was also found to be in possession of the book, as was Robert John Bardo, who murdered Rebecca Schaeffer. He was carrying the book when he visited Schaeffer’s apartment in Hollywood and murdered her. Hinkley admitted that he had studied Chapman.

Leakage

A further indicator commonly experienced is when the person of concern leaks their intentions. This contradicts the previous indicator about directly threatening but is quite different. This indicator has been seen in school shootings, political attacks, and many others.

My personal experience of preventing an attack on a British politician involved the person of concern leaking his intentions to his associates. This can be found online when a student posts a message such as ‘Don’t go to school tomorrow, they are going to pay’ or ‘Watch the news, I’ll be on it tomorrow.’

Any evidence of leakage must be taken seriously, followed up, and shared with law enforcement.

None of the indicators is predictive. Instead, they are preventative indicators that require further investigation by a specialist.

The Case for Personality Assessments in Executive Protection

0
personality assessments

When it comes to hiring executive protection or security professionals, employers have much to consider today than in years past. To start, they need to ensure a candidate has the proper qualifications and skills to fill the open position. One way is to conduct personality assessments. On that note, it is similarly crucial that applicants have a dependable and trustworthy character.

Scrutinizing potential hires for such qualities cuts the likelihood of dealing with counterproductive work behaviors in the future. Correct, employers still use background and reference checks. Yet, these are losing effectiveness due to legal and regulatory restraints recently enacted in the United States.

To supplement the vetting process, personality assessments can help weed out candidates with negative attitudes. Also, they help set apart candidates who are more likely to engage in harmful workplace behavior. When administering psychological assessments, however, it is critical your organization confirms they are legal.

On the Lawfulness of Personality Assessments

There are numerous ways psychological personality assessments can violate a candidate’s right to privacy and unbiased treatment during the application procedure. In the United States, FindLaw.com covers complex details. Still, one major thing to keep an eye on is whether your psychological analysis is health/medical in nature.

For example, personality assessments that determine whether a candidate is suffering from mental illness could be considered unlawful. This is because they violate the Americans with Disabilities Act (ADA). This piece of regulation makes it unlawful to discriminate against applicants for medical reasons. Outside of the U.S., other restrictions exist. Thus, the legality of such assessments must be reviewed by the legal and regulatory agencies of those countries.

This is precisely why using the Minnesota Multiphasic Personality Inventory (MMPI) during the hiring phase may be illogical. It is true to say that the MMPI assessment can theoretically be used to decide how a candidate’s personality traits may factor into their work performance. Yet, the test’s focus on psychopathology and finding mental illness could be seen as a quandary.

The U.S. Equal Employment Opportunity Commission (EEOC) recommends against using tools like the MMPI or Myers-Briggs Testing Indicator (MBTI) for this reason. Fortunately, there are options more well suited for pre-screening applicants and their behaviors.

personality assessments

Alternatives to the MMPI Test

Since using the MMPI test could lead to legal and ethical issues for the enterprise, what alternative personality assessments can you use while hiring?

Sixteen Personality Factor Questionnaire

Hiring managers often use the Sixteen Personality Factor Questionnaire, or 16pf, to assess potential employees. This tool utilizes sixteen different qualities to determine an applicant’s personality, which can be linked to job performance.

This test also meets the requirement to have personality assessments be more about job performance than psychopathology. In addition, it is unlikely that any of these factors could be considered discriminatory since the 16pf is not medical in nature.

The Caliper Profile

The Caliper Profile is another assessment that examines personality traits critical to job performance. The test presents applicants with statements and asks them to choose the one that is closest to their perspective. So, for example, the question might explain a situation and have them choose which reaction fits best with their values. The Caliper also has test-takers do the opposite, showing which sentiments are farthest from their viewpoint.

The Caliper is a useful tool in deciding how prospective employees may react to various situations based on their principles. It can also be customized so that employers can examine specific behaviors in which they are interested.

The SHL Occupational Personality Questionnaire

The SHL Occupational Personality Questionnaire (OPQ32) is an assessment that uses 104 questions to measure thirty-two characteristics, all of which can provide insight into how an applicant may behave on the job. The three major categories covered by the OPQ32 are:

  • Relationships with People,
  • Thinking Style and Feelings, and
  • Emotions.

Naturally, all of these can help predict how a potential employee would interact with others and handle stressful situations. However, the OPQ32 also sets itself apart by comparing the test taker’s score to other applicants. In fact, it emphasizes where their strengths and weaknesses are.

The Hogan Personality Inventory

The Hogan Personality Inventory (HPI) is another often used assessment dating back to the 1980s. The HPI measures a candidate’s temperament and compares it to the responsibilities of the role for which they are applying.

The test is made up of 206 true or false questions. These tackle areas such as:

  • Service Orientation,
  • Reliability,
  • Stress Tolerance,
  • Clerical Potential,
  • Sales Potential, and
  • Managerial Potential.

Given its range of categories and focus on specific areas, it is understandable that the HPI has been around as long as it has.

The DiSC Behavior Inventory

The DiSC Behavior Inventory (DiSC) assesses an applicant’s personality using four personality types alluded to in the test’s name:

  • Dominant,
  • Influential,
  • Steady, and
  • Compliant.

Test-takers answer a series of questions highlighting their behavior and ability for teamwork.

Unfortunately, there are a few downsides to using the DiSC assessment. For one, candidates are choosing which adjectives and phrases apply to them, which could make it easy to lie. The DiSC also does not compare the applicant’s scores to a baseline. According to TopResume, it is not considered a foolproof indicator of one’s work performance.

The Verensics Assessment

Psychological assessments have often been used to evaluate a candidate’s character. However, integrity tests are becoming a common way to judge prospective employee’s values and predict their behavior. Integrity assessments can measure an applicant’s tendency to engage in or avoid counterproductive work behavior, making them lifesavers for companies looking to avoid liability issues and high turnaround.

Verensics provides the best of both types of assessments, combining the typical integrity test with the longtime experience of corporate investigators and organizational psychologists. The result is an online assessment platform that can guide candidates to reveal values and behaviors they usually would not. The Verensics assessment is also uniquely designed to manage one of the most mentioned criticisms of assessments, which is faking.

Verensics’ platform is a valuable tool to have in the company collection, especially when looking to gain a complete picture of prospective employees’ values and behavior. Non-traditional tools like these can be game changers for those looking to replace older ones, like the MMPI and MBTI. Verensics uses the most advanced technology and appears to be the most cost-efficient alternative to the MMPI.

Finally, selection tools like Verensics supply excellent solutions for assessing applicant values and behaviors. Nevertheless, it must be noted that it is not a substitute for skills assessments. Each EP or security assignment may require various skills, which should be assessed separately through a combination of

  • Observations,
  • Verification, and
  • Professional references.

Real-Life Scenarios in EP: Celebrity Protection

0
celebrity protection

The second industry expert we invited to share his experience in split-decision making is Anton Kalaydjian. With 20 years of experience in celebrity protection, Anton gives us a 360-degree look at some of the most challenging real-life scenarios he has encountered so far.

Anton Kalaydjian, Guardian Professional Security: Celebrity Protection

About four or five years ago, I was in France for the Cannes Film Festival. And at the same time, they had Formula 1 at Monte Carlo. So every celebrity in the world was there, and when you are doing celebrity protection, that doesn’t prove easy because you will not get the treatment you get on an average day. Because everybody is somebody!

I was protecting a prominent pop artist at the time. We were among hundreds of other major celebrities. Whenever we are overseas as an American especially, it’s tricky because there is a stigma among American people and American artists. So, you have to try to mitigate that.

During that week, many situations happened, but one that comes to mind is that my artist had to go to a nightclub because the award show had some premier at the nightclub. It was the main club there, and many celebrities were present.

I did my advance and checked everything out first to ensure everything was good. I meet the head of security, the club owner, and the promoter. Get the vehicles and comms sorted. I get my client in the vehicle. We join our convoy. We got there a little early, as my artist wanted to go early.

The Notorious Throne

As soon as we enter the club, there is a central VIP table, where they had a throne, believe it or not. It was sitting in the middle of the VIP lounge. My artist decided to sit on the throne for fun. He was sitting on the throne — no big deal. But then a guy comes in, looked like a mob boss or some kind of shady guy. Anyway, this guy was important and had about four or five bodyguards with him.

He didn’t speak much English. But, of course, it’s France! Why should they speak English? At first, the guy wasn’t upset about this famous guy sitting on his throne. He joked about it by telling my artist: “Hey, you are sitting on my throne.”

My client was a little intoxicated and showed him the finger. The mob guy got really offended. So then, the club owner tells me, “Hey, that’s the main guy here. He comes here every week. We don’t want to piss that guy off for many reasons.”

Now I got to think about myself as a celebrity protection person: “Man, I’m the only bodyguard. I’m by myself with this famous artist. And we are in this guy’s section and my client is insulting him. He got four bodyguards ready to destroy everybody in front of them.”

Lying for the Client’s Sake

So, where does the quick decision-making start in this case? In our industry, we do have to lie sometimes for the safety of everybody. Once my client put the middle finger up, the guy got really insulted, and the bodyguards ran up to him, and I got in between them. I was overwhelmed, but I ended up locking in arms with one of them, the main bodyguard. We just locked each other’s arms.

I was like, “Hey, guys, listen, listen, I know this is your table, I know this is your deal. I know this is your club and country. Do me a favor. My client is drunk, he is not even 21 years old yet.” Which was a lie, because he was. But again, I had to lie.

“He’s just a kid. He doesn’t know what he’s doing.”

Luckily, the boss knew a little English, but the bodyguards didn’t. So, the boss was saying: “No, no, okay, I understand.”

It was a quick decision I had to make. What do I do? Should I engage with these guys? Do I lie? I had to make a decision.

We ended up calming them down a little bit. I told them I would get him out of the main guy’s chair. The club owner said that my client pissed off the wrong guy and that it would get terrible.

Then we went to the owner’s table as per my request. I convinced my client, in the end, to go over there. I told him, “Hey, man, this table is for these guys here. Let’s go to the owner’s table. He has girls over there, bottles, we’ll get better treatment.”

A major film action star came when we went to the owner’s table. Now my artist and this movie star are sitting both at the table, and I kind of calm the situation down with the table next to us. I went to the mob boss guy, as I believe that is who he was. The club owner strongly hinted he was. You sometimes run into these in celebrity protection.

I knew he wasn’t very happy. So I told them, “Hey guys, thanks again. Sorry for that earlier.”

The Culmination: A Celebrity Protection Crisis

Now we are at the owner’s table, and this movie star has a big fellow with him. But he is not a bodyguard but a big, heavy-set, sloppy guy. He is wasted, he is drunk, and kind of falling over himself.

At the VIP tables, they don’t sit on the couches as you do in your living room. Instead, they end up sitting on top of the couch, their behinds on the top of the back post.

Everybody is on the back post, and the drunk guy ends up falling on the glass table. All the bottles fall down. It’s a big mess. The guy is smashed. In the process, everybody was holding each other, including my client. The whole couch fell backward. That crash started a big fight between the guys on whose throne we were sitting and the guys at our table. A bunch of guys were now fighting.

celebrity protection

I grabbed my client from the ground. I slam the other guys’ arms off my client. I put him on my shoulder like a bag of potatoes and ran him into the corner of the nightclub.

Now, here’s another decision I had to make: Do I get him out of the club?

No, you don’t, because you have to think proactively. If you get him out of the club, everybody that’s engaged in the fight will be getting bounced out at the same time. So, I decided to put him in the corner of a wall, and I hovered over his body because bottles were flying left and right. It was a full brawl.

Luckily, I didn’t get hit. I knew my client wouldn’t get hit because I’m a big guy. I had him in the corner where nothing could touch him and I hovered over him. So I had to make another decision.

I made a decision earlier to lie. So, now I have to decide to get him out of the club or keep him here. I kept him there because I didn’t want to get him out into the hornets’ nest.

Things calmed down, and the bouncers came in, throwing everybody they had to out. Police were outside and handled the people out there. Everything calmed down. The music stopped, the lights were on, and it was a big mess.

Now, as the music starts and the lights go off, my client asks me, “Hey Anton, can I stay here for a little bit?”

I tell him: “Listen, we’re gonna stay here for at least 30 minutes. But you’re going to move to this table where it’s empty. Forget about the owner’s table, the big throne table, let’s find our own table.”

A Bit of Breathing Space

I find this table, and I put him in there. I let him do his thing. The night went on, and I gave one of the bouncers 50 American dollars and asked him to pop his head outside, see what it looked like, and let me know if those guys were still there.

He did it and came back, telling me the coast is clear and nobody’s out there. So I had to make another decision, should we wait longer, or should I trust this guy a little bit?

I contacted the driver and told the club owner we were going to leave, told the client we were ready to go.

We end up getting in the vehicles. The coast is clear, nothing is going on. We are driving, and all of a sudden, I notice that our driver is following a vehicle. And I ask why the driver is following this vehicle. My principal said: “Oh, those are the girls from the club I was talking to. We’re going to their villa.”

And again, you got to make a decision. So I said, “We aren’t going to their villa. Those girls were talking to that mob guy.”

For all we know, she could be setting us up and taking us to his villa. It’s not often that young girls have their own villa, so you got to make a decision. You got to think quickly.

Instead, I suggested that we contact them and let them know to follow us. I can’t tell the client they can’t mess around with those girls and are going straight to their room.

Now they were following us. It was better that way because where we were, it was a compound with gates, walls, and residential security. I knew I was coming into a sterile environment.

Safe Haven of Celebrity Protection

When we started moving to that compound, the client said to his friends in the car: “You see that. All you guys think about are chicks. You don’t think about me, about my safety. Anton thinks about me. He was exactly right.”

Basically, I wasn’t going to allow going into the hornets’ nest because we are not from there. We don’t know those girls. I had no firearms on me, as I was an American and wasn’t permitted to carry. So it was me versus everybody, and I wasn’t going to put my client at risk. Another decision that I had to make was to make them follow us. We got them to the villa; long story short, it was a successful night. They had fun.

It was a series of decisions I made. Had I not made those right decisions, it could have ended up very badly.

How Situational Awareness Enhances Protective Operations

0
protective operations

Some essential skill sets in the protective operations world do not get as much attention as others. To be effective in protective operations, protection personnel must be students of situational awareness, systematically observing and assessing their environment.

The ability to use observation skills to proactively examine the environment and spot potential threats in time to avoid or mitigate them is a crucial responsibility of protective agents. And this skill is one of the many critical technical aspects of protective intelligence.

The previous emphasis on deterrence and response by protection teams has given way to a more proactive and practical approach. And this approach relies heavily on observation skills coupled with an understanding of the methodology that terrorists and criminals use most often. Specifically, focusing on one of our enemy’s most significant weaknesses – surveillance activities directed at our protectee.

Situational Awareness and Protective Operations

Personnel involved in protection — as a member of law enforcement, a security officer, or a protective agent — need to have specialized training in situational awareness to ensure that they can recognize and appropriately react to any potential threat in the environment.

The most critical aspect of situational awareness is that we must practice its principles religiously until they become a part of one’s subconscious. Only then can we focus on specific duties like protective operations and remain switched on to possible threats to our protectee as well as to ourselves. Only if we can adequately “protect ourselves” will we be able to protect others.

Protective Intelligence

There are a variety of activities, strategies, and skills that protective operations personnel use to determine threats and take proactive measures to prevent or avoid an incident. This begins with a thorough threat analysis for the protectee as well as research on the specific threats in the areas where the protectee will operate.

Besides threat analysis, the protection team needs to actively work in the environment, conducting route planning and analysis for every movement of the protectee.

Route analysis is the tactical examination of the environment from the point of the view of an attacker looking for surveillance points, potential attack sites, and any hazards which may cause harm to the protectee or impact the ability to move the protectee from one location to another securely.

Protective intelligence is a critical factor. As the US Secret Service preaches, no protection activity is more effective than the protective intelligence (intel/threat recognition and advances, etc.) done in preparation for the operation.

A Change in Strategy – Countersurveillance Teams

If I were to describe the top level of protective operations, I would have to mention the use of surveillance detection (SD) by protection team members and the possible addition of countersurveillance (CS) personnel to augment the protection team. These surveillance-focused elements became relevant in response to several successful terrorist attacks on notable figures in the 1980s and 1990s.

Until the early 1990s, protective operations operated on the “Iron Box” philosophy that protection was accomplished by target hardening and using security personnel and armored vehicles. This was the standard operating principle of deterrence and hard skills reaction to any threats to a protectee. Hence, the “Iron Box.”

While this method did hold a level of deterrent effect, a determined and intelligent enemy could counter the protection plan by increasing the number of attackers to neutralize the security agents and/or use anti-armor weaponry to defeat the armored vehicles.

Shortcomings of the Iron Box

The problem with the Iron Box methodology was exemplified when a West German terrorist group, the Red Army Faction (Baader Meinhoff Gang), assassinated Deutsche Bank President Alfred Herrhausen in 1989.

Herrhausen’s protection detail and armored vehicle did not prevent his death and clearly showed that the Iron Box method was no longer effective.

The security industry needed a new model to address the threat of sophisticated criminal and terrorist groups. A thorough study of the terrorists and their methods revealed that they were all using a variation of a terrorist planning an attack cycle and that there were weaknesses within this cycle that could be exploited to prevent or mitigate a terrorist attack. The defect was in the requirement for terrorists to conduct surveillance on the target to acquire the data necessary to plan and execute a successful attack.

This attack cycle was later found to be in use by organized criminal elements and even active attackers/shooters. By understanding the methods used by these groups to target and attack their victims, a new strategy was created to exploit the weaknesses in the attack cycle, precisely the surveillance requirements of the attackers.

protective operations

Surveillance Detection in Protective Operations

To target a protectee, an attacker must know where the protectee is located, when the protectee is moving and when the protectee will arrive at a location. At a minimum, the attackers must be aware of the protectee’s site early enough to prepare to act. While more sophisticated attackers can gather this data electronically, at some point, all attackers must employ “eyes on” the target.

Surveillance Detection (SD) in the protective operations world involves specific activities that help us determine if a hostile element is surveilling our protectee (or our security personnel). For example, they could be doing so to collect information that will later be used to plan and execute any of the following:

  • attack,
  • assault,
  • assassination, or
  • kidnapping.

As a skill set, SD is considered a critical defensive capability for modern protective teams. Within the Attack Cycle, there are usually three surveillance steps (Initial Target Selection, Post Target Selection, and Pre-attack Surveillance). These provide us with the best opportunities to detect hostile surveillance.

Thinking like the attacker, we need to find the most likely surveillance points near our protectee’s work, residence, along routes, near chokepoints, and around all potentially viable ambush sites. We need to analyze potential surveillance points looking for the likely places where the surveillants will be located and the possible methods they may use to blend into their environments. For example, a local park across from the protectee’s residence may provide ample cover for a surveillant.

CIA Countersurveillance (CS) Teams

With the discovery of a serious terrorist threat to the CIA Director and the demise of the Iron Box methodology, CIA security began to focus on threat surveillance. A CIA countersurveillance (CS) team was created in 1993 to specifically look for the terrorist surveillance signature.

I was one of this unit’s first members, which also appears to be the first countersurveillance team that the US Federal government employed. The team worked directly with the CIA Director’s Protection Detail, but in this new capacity, we often operated independently from the detail.

Nevertheless, to ensure coverage and coordination, we maintained constant communications with the detail to ensure they knew our location, what we were doing, and how we would support the Director’s movements.

This CS element became an essential part of the protective operations efforts at the CIA, augmenting advances and protective intelligence investigations. In situations where protection teams were unfeasible, or there was a significant threat, the CIA often utilized a specialized Counterterrorism Surveillance (CTS) Unit to look for the terrorist surveillance signature on our personnel in hazardous environments.

These CTS units were a totally clandestine element in the CIA’s arsenal until a brief revelation of the unit’s role in finding and documenting Carlos the Jackal in Khartoum, Sudan, in a book written by Billy Waugh titled “Hunting the Jackal.” The only “officially approved” exposure of this unit and its activities were in my book, “GUARDIAN – Life in the Crosshairs of the CIA’s War on Terror,” where I discuss my time working in the CTS unit in Europe, the Middle East and Southeast Asia.

Protective Operations CS Teams

If adding a protective countersurveillance team is an option, there are some definite advantages for the protectee and the protective detail alike.

CS teams — dedicated to advance type activities and overwatch positions during protection activities — provide the highest possible protection envelope. By combining the best protective operations techniques with the best surveillance techniques, we can saturate an area in advance, recognize threats or potential threats, and adjust the plans before the arrival of the protectee. This is the best “avoidance” capability and allows the team to be proactive (not reactive) to any threats – a primary goal of the protection team.

The US Secret Service felt that if the protection team had to react to a threat, they had failed on several levels – protective intelligence, advances, etc.

Staffing appropriately is critical for the success of any element within protective operations, and this is no less the case with a CS element.

Personnel with experience in covert operations or surveillance are ideal for this work as long as they receive thorough training in protective operations methodology. In addition, all protection team members must know how the other elements will support each other to prevent mistakes and gaps in coverage.

Conclusion

Protective operations agents need to have some formal training in situational awareness (observation skills and principles, etc.) as this is the most fundamental aspect of protective intelligence. Protective agents also need to learn the characteristics associated with terrorist groups and other threats in the environment, emphasizing understanding the attack cycle and behaviors associated with surveillance activities.

Several organizations provide training courses available, as well as some exceptional books on related subjects:

  • “The Gift of Fear” by Gavin de Becker
  • “Left of Bang” by Patrick Van Horne

For example, the Arcuri group has a 4-hour Situation Awareness Specialist® (SAS)​ course as well as a 5+hour advanced course, the Advanced Practitioner (SAS – AP), which specifically addresses the terrorist attack cycle, and protective operations and the characteristics associated with terrorist surveillance (behavioral signature).

If staffing and resources allow, the protection team can add a specific countersurveillance element to look for and investigate potential hostile surveillance activity. All these elements are proactive and fall under the protective intelligence umbrella.

Effectiveness of Firearms in Executive Protection

0
firearms in executive protection

There has been a lot of discussion on the effectiveness of firearms in executive protection. For many protectors, as well as for protectees, guns are synonymous with protection. In addition, they appear to be an indispensable requirement for exercising this profession. That is why we gave ourselves the difficult task of determining, with facts, the effectiveness of firearms in real-life situations.

However, this purpose is almost impossible to specify through absolute scientific rigor since, only in Mexico, it would be practically unfeasible to account for how many people perform this activity, including:

  • Private security agents,
  • Complementary police,
  • Police officers,
  • Military who perform these tasks on official commission,
  • Military in retirement who work on their own, etc.

We do not have a precise number of protectors in the world. We do not know how many of them have a gun, nor the number of total events in which they could have used it with or without success.

Methodology and Data on Firearms in Executive Protection

We know that only in Mexico, according to the INEGI, in the last three decades, a total of 2.877 executives have been murdered. Still, we ignore how many of them had protectors and how many carried firearms.

If we extrapolate this globally, doing an exact study becomes impossible. That is why we decided to take a representative sample that allowed us to obtain a result, although approximate, significant enough to determine the performance of firearms in executive protection.

For this purpose, we analyze 124 attacks against prominent public figures during the 20th and the 21st centuries in 60 countries.

What were the criteria for considering these 124 cases? For the sample to be significant, we took into account the following aspects:

  • Universal nature – the cases are from around the world;
  • Historically verifiable and widely disseminated facts;
  • The number of cases is sufficiently representative;
  • Covers a significant period;
  • It is verifiable that the victims had an armed security protection team;
  • Victims are people of very high rank in their respective countries or persons with official protection assigned by the authorities. (So, it can be presumed that the agents that provided protection were duly selected and trained. Thus, the reaction failures can not be attributed to a lack of training or aptitude, characteristic of extreme relevance for the present analysis).

Only assassinations and assassination attempts have been considered because kidnappings would be impossible to quantify. Moreover, it would be extremely difficult to have historically verifiable facts about the performance of armed personnel in each case. The same applies to the use of firearms against random assaults and other types of similar problems since they are even less documented.

firearms in executive protection

Relevance of Firearms in Executive Protection

The sample of the 124 universal and verifiable cases is sufficiently broad and representative to show us what the best-armed security groups, in their respective countries, managed to do in the cases of actual attacks that occurred over more than a century and what was the relevance that firearms had to protect people in all these cases.

To consider that in a particular attack the use of firearms was successful, the criterion is that weapons should have been used effectively. That is to say that their use was decisive for the protectee to be unharmed. Otherwise, the survival could be attributed to an accident and not to the effectiveness of weapons.

Of course, the study also considered some documented cases where measures such as intelligence were decisive, so the attack was deactivated far from the protectee in space and in time as it should be in modern executive protection.

We divided the cases into two parts:

  • In the first one, the attacks were not successful for various reasons, and
  • In the second one, the attacks had a fatal result.

We can note that only in 4.03% of cases, firearms were decisive in saving the protectees.

So, this particular study shows very little relevance and reliability that this tool has in executive protection. Of course, as we could also see, 4.03% can save the life of the protectee, so it should not be abolished.

Myth and Action Movies

Firearms should not be considered the main tools in executive protection, nor should the security system of a VIP be focused on its employment. Of course, this is not intended to be a definitive study. Still, it can give a general idea about the degree of effectiveness of firearms in executive protection.

It is also important to note that, for decades, its preponderance in this industry was based on a myth or in action movies — not on the facts or the hard data.

Surprisingly, in 7.2% of the cases, the attacks were frustrated or later controlled by “empty hands.” These techniques were used against the lonely aggressors who attacked public figures from the crowd. This does not necessarily mean empty-hand combat techniques are more effective than weapons. This simply showed their efficacy for a specific threat that was frequent in the study, but it also means that empty-hand combat skills are essential in executive protection.

It is important to point out the attack against the presidential candidate of Colombia, Luis Carlos Galán, who was killed despite having 18 heavily armed agents. This fact makes it evident that a numerous and heavily armed detail is not necessarily an effective detail.

So the present representative sample gives an approximate value of 4.03% effectiveness of firearms in real-life situations. Of course, some might highlight its importance as a deterrent factor. However, analyzing its other advantages and disadvantages is not the subject of this study. Here we focus solely on analyzing a representative sample of its effectiveness in real crises.

Final Remarks

In conclusion, the firearm in executive protection is a tool of minor importance and reliability. However, it should not be dismissed since, as we saw, it can save our lives in some conditions.

The important thing is to focus our operations on preventive activities that allow us to anticipate and deactivate the attacks before they happen and stop focusing our operations on methods that historically didn’t give enough results.

Intents:

  1. Eduard, Prince of Wales – 1900
  2. Leopold II, King of Belgium – 1902
  3. Alfonso XIII, King of Spain – 1906
  4. Theodore Roosevelt, presidential candidate, EU – 1912
  5. Vladimir Ilich Lenin, Leader of Soviet Revolution – 1918
  6. Georges Clemenceau, Prime Minister of France – 1919
  7. Benito Mussolini, Leader of Fascist Italy – April 1926
  8. Benito Mussolini, Leader of Fascist Italy – May 1926
  9. Herbert Hoover, President USA – 1928
  10. Franklin D. Roosevelt, President USA – 1933
  11. Keisuke Okada, Prime Minister of Japan – 1936
  12. Mohammad Reza Pahlavi, Sha de Iran – 1949
  13. Harry Truman, President USA – 1950 (firearms were decisive)
  14. Prince Hussein, Prince of Jordan – 1960
  15. Konrad Adenauer, German Chancellor – 1952
  16. Hendrik Verwoerd, Prime Minister of South Africa – 1960
  17. Charles de Gaulle, President of France – 1961
  18. Charles de Gaulle, President of France – 1962
  19. Georgios Papadopoulos, President of Greece – 1968
  20. Leonid Brezhnev, Secretary General of the Soviet Union – 1969
  21. George Wallace, presidential candidate EU – 1972
  22. Ana, Princess of England – 1974
  23. Sukarno, President of Indonesia – 1962
  24. Gerald Ford, President USA – 1975
  25. Isabel II, Queen of England – 1981
  26. Pope John Paul II – 1981
  27. Reagan, President of the United States – 1981
  28. Chun Doo Hwan, President of South Korea – 1983
  29. Margaret Thatcher, first female British Prime Minister – 1984
  30. Augusto Pinochet, President of Chile – 1986 (firearms were decisive)
  31. Wolfgang Schäuble, German Prime Minister – 1990
  32. John Major, Prime Minister of UK – 1991
  33. Eduard Shevardnadze, President of Georgia – 1992
  34. Eduard Shevardnadze, President of Georgia – 1995
  35. Hosni Mubarak, President of Egypt – 1995 (firearms were decisive)
  36. Kiro Gligorov, President of Macedonia – 1995
  37. José María Aznar, Spanish politician – 1995
  38. Prince Charles of Wales – 1995
  39. Eduard Shevardnadze, President of Georgia – 1998
  40. Jacques Chirac, President of France – 2002
  41. Hamid Karzai, President of Afghanistan – 2002 (firearms were decisive)
  42. Pervez Musharaf, President of Pakistan – 2003
  43. Murat Zyazikov, President of Ingushetia – 2004
  44. Shaukat Aziz, Prime Minister of Pakistan – 2004
  45. Sheikh Hasina, Prime Minister of Bangladesh – 2004
  46. Ibrahim Rugova, President of Kosovo* – 2005
  47. Pervez Musharaf, President of Pakistan – 2007
  48. George W. Bush, President USA and Mikhail Saakashvili, President of Georgia – 2005
  49. Abdullahi Yusuf Ahmed, President of Somalia – 2006
  50. Gotabhaya Rajapaksa, Secretary of Defense of Sri Lanka – 2006
  51. Dick Cheney, Vice President of the United States – 2007
  52. Guillaume Soro, Prime Minister of Ivory Coast – 2007
  53. Abdul Gayoom, President of Maldives – 2008
  54. Jose Ramos Horta, President of East Timor – 2008
  55. Queen Beatrix, Queen of Netherlands – 2009
  56. Yunus-bek Yevkurov, Leader of Ingushetia – 2009
  57. Stephen Timms, British Labor MP – 2010
  58. Ali Abdulah Saleh, President of Yemen – 2011
  59. Alpha Condé, President of Guinea (firearms were decisive)
  60. Abdul Ghafoor Haideri, Leader of the Pakistani Senate – 2017
  61. Nicolas Maduro, President of Venezuela – 2018
  62. Omar Garcia Harfuch, Chief of the City of Mexico – 2020
  63. Ivan Duque, President of Colombia – 2021
  64. Assimi Goita, President of Mali – 2021
  65. Aleksandar Vučić, President of Serbia – 2022

FATAL RESULTS

  1. William McKinley, President USA – 1901
  2. Francisco Fernando (Franz Ferdinand), Archduke of Austria – 1914
  3. Sidonian Country, President of Portugal – 1918
  4. Michael Collins, Irish Revolutionary Leader – 1922
  5. Ahmet Muhtar Zogolli – 1924
  6. Aleksandar I, King of Yugoslavia – 1939
  7. Walter Edward Minister of United Kingdom in the Middle East- 1944
  8. Ahmad Mahar Pasha, Egypt Prime Minister – 1945
  9. Mahmud Fahmi Nokrashi, Egyptian Prime Minister – 1948
  10. Abdullah I, King of Jordan – 1951
  11. José Antonio Remón Cantera, President of Panama – 1955
  12. Hendrik Verwoerd, Prime Minister of South Africa – 1960
  13. Hazza Al Majali, Jordan’s Prime Minister – 1960
  14. Louis Rwagasore, Prime Minister of Burundi – 1961
  15. John F. Kennedy, President USA – 1963
  16. Jospeh Bamina, Prime Minister of Burundi – 1965
  17. Hendrik Frensch Verwoerd, President of South Africa – 1966
  18. Robert F. Kennedy, United States Attorney General – 1968
  19. Abdirashid Ali Sharmarke, Somalia President – 1969
  20. Wasfi Al-Tal, Prime Minister of Jordan – 1971
  21. Abdul Rahman, Malaysian Police General Inspector – 1974
  22. Francois Tombalbaye, President of Chad – 1975
  23. Shaik Mujibur Rajman, President of Bangladesh – 1975
  24. Muhammed, Head of State Nigeria – 1976
  25. Hans Martin Schleyer, German business leader – 1977
  26. Markenngouabi, President of Congo – 1977
  27. Ahmad Bin Hussein al-Ghashmi, President of the Republic of Yemen – 1978
  28. Park Chung Hee, President of South Korea – 1979
  29. Lord Louis Mountbatten, Diplomatic, British Royal Navy Officer – 1979
  30. William Richard Tolbert, President of Liberia – 1980
  31. Anwar Sadat, First Minister of Egypt – 1981
  32. Ziaur Rahman, President of Bangladesh – 1981
  33. Bachir Gemayel, elected President of Liban – 1982
  34. Mohammad Ali Rajai, President of Iran – 1981
  35. Indira Gandhi, Prime Minister of India – 1984
  36. Rodrigo Lara Bonilla, Minister of Justice of Colombia – 1984
  37. Thimas Sankara, President of Burkina Faso, 1987
  38. Carlos Mauro Hoyos, Attorney General of Colombia – 1988
  39. Luis Carlos Galan, Presidential Candidate of Colombia – 1989
  40. James N Rowe, US Military Advisor – 1989
  41. Waldemar Franklin Quintero, Commander of Antioquia Police, Colombia – 1989
  42. Alfred Herrhausen, CEO Deutsche Bank – 1989
  43. Samuel Doe, President of Liberia – 1990
  44. Bernardo Jaramillo Ossa, Presidential Candidate, Leader of The Patriotic Union Party – 1990
  45. Rajiv Gandhi, Hindu Politician – 1991
  46. Giovanni Falcone, Judge for Anti-Mafia – 1992
  47. Melchoir Ndadaye, President of Burundi – 1993
  48. Luis Donaldo Colosio, Presidential Candidate in Mexico – 1994
  49. Juvento Habyarimana, President of Rwanda – 1994
  50. Yitzhak Rabin, Prime Minister of Israel – 1995
  51. Vazgen Sargsyan, Prime Minister of Armenia – 1999
  52. Luis María Argaña, Vice President of Paraguay – 1999
  53. Zoran Djindjic, Prime Minister of Serbia – 2003
  54. João Bernardo Vieira, President of Guinea 2009
  55. Ali Abdulah Saleh, President of Yemen – 2017
  56. Alexander Zajarchenko, President of the Republic of Donetsk – 2018
  57. Aristotle Sandoval, former Governor of the State of Jalisco – 2020
  58. Jovenel Moise, President of Haiti – 2021
  59. Shinzo Abe, former Prime Minister of Japan – 2022

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.