Beyond The Bodyguard PDF
Beyond The Bodyguard PDF
Beyond The Bodyguard PDF
Bodyguard
Beyond the
Bodyguard
Proven Tactics
and Dynamic Strategies For
Protective Practices Success
Gavriel Schneider
Universal-Publishers
Boca Raton
Beyond the Bodyguard:
Proven Tactics and Dynamic Strategies for
Protective Practices Success
www.universal-publishers.com
Library of Congress Cataloging-in-Publication Data
Schneider, Gavriel.
Beyond the bodyguard : proven tactics and dynamic strategies for protective practices
success / by Gavriel Schneider.
p. cm.
Includes bibliographical references.
ISBN-13: 978-1-59942-932-8 (pbk. : alk. paper)
ISBN-10: 1-59942-932-2 (pbk. : alk. paper)
1. Bodyguards. 2. Private security services. I. Title.
HV8290.S36 2009
363.28’9--dc22
2009010259
Photos in this book are either from the author’s personal collection or
from the Dynamic Alternatives photo archives and have been used
with permission from Dynamic Alternatives (Pty) Ltd.
List of Abbreviations.................................................................................................................................. x
Acknowledgements.................................................................................................................................... xi
Preface.......................................................................................................................................................... xi
Introduction................................................................................................................................................xv
v
Unarmed Combat and Close Quarter Battle (CQB)/Self Defense................................................20
Unarmed combat............................................................................................................................21
Edged weapon combat..................................................................................................................21
Improvised weapon combat..........................................................................................................22
Use of alternative weapons...........................................................................................................22
Restraint and control techniques.................................................................................................22
Team tactics and applied unarmed combat................................................................................22
Firearm Skills............................................................................................................................................23
Basic firearm understanding and training..................................................................................23
Target shooting skills.....................................................................................................................24
Firearm close-quarter battle (CQB) skills..................................................................................24
Urban movement and house penetration skills.........................................................................25
Night/low-light shooting skills...................................................................................................25
Protection team and single operative firearm skills..................................................................26
Firearm disarming skills................................................................................................................26
Firearm retention skills.................................................................................................................26
Weapon integration skills.............................................................................................................27
First Aid.....................................................................................................................................................27
Security and Planning..............................................................................................................................28
Protective Driving Skills..........................................................................................................................29
Defensive driving, as a CPO you must be able to.....................................................................30
Security awareness incorporated into preventative driving.....................................................30
Convoy/motorcade driving...........................................................................................................30
Offensive driving............................................................................................................................30
CPO Protocol and Etiquette..................................................................................................................31
Dress and appearance....................................................................................................................32
Communication skills....................................................................................................................32
Personal hygiene.............................................................................................................................32
Habits...............................................................................................................................................33
Behavior...........................................................................................................................................33
Social skills......................................................................................................................................33
Customs and traditions.................................................................................................................33
Written Field Work.................................................................................................................................34
Warning order................................................................................................................................34
Operational Appreciation........................................................................................................................35
Threat assessments.........................................................................................................................35
Principal profiling...........................................................................................................................35
Operations order............................................................................................................................37
Record and report keeping...........................................................................................................37
Related Skills (Operational Appreciation and Management)...........................................................38
Hostage crisis and management..................................................................................................38
Anti- and counter-terrorism.........................................................................................................38
Counter-sniping.............................................................................................................................39
Specialized tactical training..........................................................................................................39
Waterborne security......................................................................................................................39
Aviation security.............................................................................................................................39
Information Security................................................................................................................................40
Conclusion – Summary of Key Points.................................................................................................41
vi
Chapter 4: How to Select the Right Trainer
and the Best Training Program For You
Introduction...............................................................................................................................................43
Can Close Protection be Divided According to Tasks and Competencies?...................................44
Static protector...............................................................................................................................45
Security driver.................................................................................................................................45
Close protection operative............................................................................................................45
Team leader.....................................................................................................................................45
Group/operational leader.............................................................................................................45
Screening of Candidates before Training (Pre‑selection)..................................................................46
Duration of Training................................................................................................................................46
Fully competent CPO...................................................................................................................46
Subdivision of roles and duties....................................................................................................47
Intensity of Training Courses.................................................................................................................47
Content of Training Courses..................................................................................................................48
The Focus of Close Protection Training...............................................................................................49
Ongoing Training and Retraining..........................................................................................................50
Frequency of retraining.................................................................................................................51
The focus of retraining..................................................................................................................52
Instructor-Related Factors......................................................................................................................52
What Makes Someone a Competent Instructor.................................................................................52
Instructional Methodology Needed for Close Protection Training................................................53
Chart 1: Variables Needed for Effective Close Protection Training................................................55
Conclusion – Summary of Key Points.................................................................................................55
vii
Chapter 6: Terrorism, the International Environment,
and Close Protection
Introduction...............................................................................................................................................69
Definitions.................................................................................................................................................71
What differentiates a terrorist attack from a criminal offense?..............................................71
Terrorism and Close Protection.............................................................................................................73
International Environment and Terrorism...........................................................................................74
Fundamentalist Attacks...........................................................................................................................76
Effects of International and Local Terrorism on Close Protection..................................................78
Ramifications of Terrorist Activities for the Training of
Close Protection Operatives.............................................................................................................79
Conclusion – Summary of Key Points.................................................................................................80
viii
Chapter 8: Use of Force Options and Close Protection
Introduction...............................................................................................................................................99
Definitions...............................................................................................................................................101
Background to the Use of Minimum Force Concept.......................................................................101
The Need for CPOs to Possess Rounded Skills...............................................................................102
Situational Factors Affecting Use of Force.........................................................................................104
Firearms usage at various different distances...........................................................................104
Crowds and working environment effects on use of force.....................................................105
Identified Training Inadequacies in Close Protection......................................................................106
Martial Arts and Close Protection......................................................................................................107
Conclusion – Summary of Key Points...............................................................................................109
Appendix: Definitions...........................................................................................................................139
List of References....................................................................................................................................143
Endorsements..........................................................................................................................................150
ix
List of Abbreviations
Abbreviation Description
ABET Adult-Based Education and Training
AO Active Opposition
AOP Attack on Principal
BG Bodyguard
CAT Counter Action Team
CBM Centre Body Mass
CPO Close Protection Operative/Officer
CQB Close Quarters Battle
CT Counter Terrorism
DT Defensive Tactics
IED Improvised Explosive Device
IAD Immediate Action Drill
PES Personal Escort Section
RST Residential Security Team
RTO Registered Training Organization
SAP Secure Advance Party
SAS Special Air Service
SIA Security Industry Authority
SME Subject Matter Expert
SOB Security Officers Board
VIP Very Important Person
NOTE:
The term “Close Protection” has been written in capital letters when it
is used to describe the specific specialist field of security (one core con-
cept). When describing a related aspect such as close protection team or
close protection training, capital letters have not been used. The same
would apply for the term “Principal” which is used to distinguish a core
object and related aspects such as principal profiling which has no capi-
tal letters.
x
Acknowledgements
xi
Preface
Much of the material used to compile this book was taken from a three-
year Master’s Degree study on “How to professionalize the Close Pro-
tection industry in South Africa”. Over 20 in-depth interviews with
industry specialists including military, police, and private sector close
protection operatives were conducted. In addition a full review of ex-
isting literature and practices in other countries was performed. This
was coupled with my personal experience and lessons learned in over a
decade of operations and training. I in no way claim that the guidelines
in this book are “the only way to do things” but they have been well re-
searched and in many cases have saved lives. I would urge anyone who
truly wants to be professional to “never stop learning” and constantly
strive to improve himself or herself both physically and mentally. This
book is based on extensive research that was aimed at determining the
current operational skills requirements for close protection operatives
(CPOs). Operational skills refer to those skills that are vital in order for
a CPO to effectively protect a designated person (this person is referred
to as the “Principal”).
During the research, it was found that the task of providing Close
Protection could be divided into various subcategories. This was nec-
essary in order to gain a rounded perspective of a CPO’s roles and du-
ties. CPO tasks in their entirety had to be unpacked into their smaller
subcomponents. In fact there were many ways to subdivide the skills,
requirements, and functions of CPOs. It was found that the actual
subdivisions were less important than the gaining of a comprehensive
understanding of how all the aspects are interrelated and should
function synergistically.
Some key points you will learn are as follows:
This book will discuss various training related factors that were
identified and examined in order to assess whether the way CPOs are
trained is effective. Aspects such as the intensity, focus, duration, and
content were examined. In general, it was found that it is important for
the following to be implemented:
1. Effective screening and pre-training evaluation of potential trainees.
2. Training should be job orientated and focus on training CPOs
for the functions that they will actually have to perform.
3. Training methodologies should focus on an outcomes based ap-
proach and utilize the fundamentals of adult based education.
xii
Gavriel Schneider
xiii
Beyond the Bodyguard: Proven Tactics and Dynamic Strategies for Protective Practices Success
•
A CPO needs to have a working knowledge of all security related
aspects that could enhance the safety of his/her Principal (i.e.,
multi-skilled).
In addition to the above-mentioned factors, other recommendations
emanating from the research that will be discussed in this book focus on
minimum competency standards for the identified subdivisions of close
protection. Examples of possible assessment guidelines and criteria will
be identified and cover the following broad classifications:
• prior educational qualifications
• physical abilities Key Points
• CPO skills
1. Do I want to be able
• prior experience in guarding to perform the du-
• firearm skills ties of a CPO?
• unarmed combat 2. Am I the right per-
• protective skills son for the job?
• first aid skills 3. Training must be job
• security knowledge related
• advanced driver training 4. Training should be
outcomes based
• protocol and etiquette
• management and business skills
• related skills
xiv
Introduction
LOGBOOK DAY 1
TIME: ZULU ALPHA 08:00
Briefing Session
Task: Advanced Hijack Avoidance Training for land and air operations
Training to be given tomorrow, to an African Royalty Protection team. Update
necessary due to a kidnap threat. After training and evaluation, Alpha Team will be
joining the Royal Protection Team to offer primary support. Planning team to compile
advance reports—and develop primary and contingency plans.
Threat level 1 – A1/High Risk.
LOGBOOK DAY 1
TIME: ZULU ALPHA 09:00
Tasking: Meet and Greet Celebrity Beauty Queen flying in from USA on behalf of
International Health Federation for AIDS Awareness. Introduce her to Bravo team leader.
ETA: 10:30 Check travel agenda and itinerary ready
Check alternative routes
Check hotel
Check restaurants
Bravo Team to escort Principal from then on.
xv
Beyond the Bodyguard: Proven Tactics and Dynamic Strategies for Protective Practices Success
LOGBOOK DAY 1
TIME: ZULU ALPHA 12:00 to 18:00
Tasking: Oversee Static Protection of 3 Principals from International Bank at Airport
Hotel Convention Centre—High Risk—Confirmed threats
Intelligence reflects one of the Principals has had numerous death threats. The other
two are High Kidnap Risks.
Coordinate venue search: Explosive dogs pick up a small explosive device found on
podium. Police bomb squad called, Venue evacuated and changed to secondary
location, Threat is still high but as the location of the secondary venue has been kept
confidential the meeting will proceed.
LOGBOOK DAY 1
TIME: ZULU ALPHA 19:00
Phone call request to stand in on operation as manpower is short.
Tasking and Principal: Deploy as part of escort detail for West African presidential
candidate visiting the country
Location Address: Country embassy
Threat Level: Alpha 1/High Risk – Team deployed in conjunction
with police units
Intelligence Reports:
Attempted assassination possible
Prevention Methodology:
Outer perimeter access control, with various cordons and
checkpoints including metal detectors and screening of all guests.
Podium and surrounding area have been swept using dogs for
explosive detection.
Incident report: I was positioned on the podium, scanning the crowd and confident
that all precautions were taken.
I was fatigued from earlier taskings, While scanning the crowd—I
saw a knife blade come out from one of the people in the crowd,
approximately 15 feet away. The CPO deployed in front of me took
the attacker down. Simultaneously the rest of the team kicked into
action providing cover and evacuating the Principal.
“What would the consequences be if the presidential candidate was assassinated on
foreign soil—DISASTER—which is precisely what we are preventing”.
xvi
Chapter 1
Background to
this Unique Book
Introduction
The area of specialist/private security is a relatively under-researched field
when compared to other fields. This is even more apparent when consid-
ering specialist subdivisions such as Close Protection, sometimes referred
to as VIP protection or protection of designated persons. Close Protec-
tion is a holistic approach to the protection of designated individuals. It
encompasses all the necessary subsectors of security knowledge and phys-
ical skills needed to ensure the protection of a person from both identified
and unidentified threats as well as risks to life and personal safety.
The person receiving protection is referred to as the “Principal.” In
cases where the Principal is also the person financing the security op-
eration or protection services, he/she would also be referred to as the
client. It is almost impossible to keep a Principal in a 100 percent risk-
free state at all times. Therefore, the primary task of a Close Protection
Operative (CPO) would be to minimize the exposure of a Principal to
any identified risks. The CPO’s tasks must also include effective plan-
ning, which must take into account what should be done in the case of
unexpected situations occurring or attacks being initiated.
The CPO therefore functions in a continuous state of identifying and
assessing all relevant risks and threats, while simultaneously taking the
necessary preventative measures to thwart or avoid such situations.
The CPO not only needs to be able to perform all necessary func-
tions relating to threat assessment and risk analysis, but also, if nec-
essary, physically implement the appropriate counter measure within
1
Beyond the Bodyguard: Proven Tactics and Dynamic Strategies for Protective Practices Success
the constraints of the law. This would include physical combat, utiliz-
ing whatever means1 available to neutralize attackers and maintain the
safety of the Principal.
International Influences: An Overview
It is important in this modern day and age that no research topic be
analyzed in isolation, especially when the topic involves the protection
of peoples’ lives. Globalization and the need for international bench-
marking mean that it is vital for international trends to form part of
this research. It is difficult to generalize about international standards
and operational procedures as they vary substantially from country to
country. Several international representatives from Israel, Britain, and
Australia were interviewed While writing this book. Correspondence
also took place with the Home Office in the United Kingdom (UK),
the National Institute for Criminal Justice Research of the Department
of Justice in the United States of America (USA) and the Australian
Institute for Criminology.
A great deal of information was also obtained through extensive in-
depth interviews with subject matter specialists. The majority of the
interviewees have worked internationally and had extensive interaction
with international trainers and operatives.
An Urgent Need Exists!
A need exists to clarify many aspects of the close protection industry
since there is a general lack of understanding and information regard-
ing what close protection work entails and who the kind of client that
actually utilizes such a service is, let alone being able to assess what
the necessary specialized training standards for CPOs should entail.
Many people have a set stereotype about who and what a close protec-
tor should be. However, these stereotypes are most often incorrect or
flawed, colored by public perceptions of security guards in general or
news reports in the media2.
Aims of This Book
This book addresses the problems that lie in the difficulty of an accurate
analysis of the skills, training, and qualification level of CPOs that are
actually operating in the world today. This book will therefore focus on
the necessary operational skill requirements needed to provide effective
close protection on a global scale.
There have been reports about nightclub bouncers who are sometimes confused
2
with CPOs.
2
Gavriel Schneider
4
Chapter 2
which obviously favored the weapons of that day—for example, the use
of the sword by Samurai in ancient Japan.
Many key principles of Close Protection can even be traced back to
the ancient text known as The Art of War
Key Principles which was written over 2,000 years ago by
1. Proactive planning the Chinese military strategist Sun Tzu.
2. Avoidance Among the many applicable concepts and
3. Know yourself tactics, which are as relevant today as they
4. Know your enemy
were when the Sun Tzu’s book was written,
is the idea of proactive planning and avoid-
ance to achieve objectives.
On this point, Sun Tzu stated the following:
“Know the enemy and know yourself; in a hundred battles
you will never be defeated. When you
are ignorant of the enemy but know yourself,
your chances of winning or losing are equal.
If ignorant of both your enemy and yourself,
you are sure to be defeated in every battle”
—Tzu, 500 B.C.: 106
The above quote can be directly translated to the well-accepted close
protection adage often mentioned in close protection training material
and sometimes referred to as the “Seven P’s of
Self Test Close Protection,” namely “Prior proper planning
• What did I learn? and preparation, prevents poor performance.”
• How, when and
(Dynamic Alternatives: 20). In the modern-day
why will I best world of specialist security, Close Protection is as
put it into prac- accepted as any other relevant security function.
tice and what is However, many of the interview respondents
the best way I when asked about outside perceptions of Close
will do this? Protection made comments similar to the one be-
low:
“The overall objectives, the attributes of the operatives and
the manner in which the job is performed
are still for the most part misunderstood
by those not directly involved”
—David M. Sharp
Several films on the subject such as The Bodyguard and In the Line
of Fire’ have added to the mystique of Close Protection. However, even
though there are certainly aspects of Close Protection that are accu-
rately portrayed in such films there are in fact many more questionable
6
Gavriel Schneider
7
Beyond the Bodyguard: Proven Tactics and Dynamic Strategies for Protective Practices Success
This is required in order to make sure that CPOs are providing pro-
tection in the most effective manner for today’s environmental and situ-
ational demands.
Increase in the Demand for
Professional Close Protection Operatives
There are several aspects that need to be outlined
Self Test when looking at the increase in demand for close
protection operatives. Several of these are not new
List 5 groups ideas. However, globalization and the ease of ac-
of people that cess to information through the Internet and oth-
make use of er media sources have made the previous reasons
close protection
services
(these will be outlined later in this section) for
why Principals may have needed protection even
more applicable. The rationale discussed below is
not listed in any order of priority, importance or
preference. It should be noted that in different regions each reason may
be of greater or of lesser importance.
i) Kidnap and ransom
The first key reason for the need for protection services by individu-
als, families or companies to be discussed is the threat of kidnap and
ransom. In general the victims of kidnap and ransom situations would
be high profile and fit into one of the following group classifications:
• political
• celebrity
• influential
• wealthy
• personal/other
It is accepted and outlined in most relevant literature that one of the
most effective ways of minimizing the chances of kidnap occurring is
to utilize the services of a well-trained close protection detail. This has
become even more important as the earnings of most prominent public
company CEOs and directors have become public knowledge (forced
disclosure for reasons of transparency and good governance) and at
times even being published in newspapers.
This aspect is a trend that was identified during the in-depth in-
terview process. Several of the respondents predicted that kidnapping
would increase in the future.
The reasoning behind this was that as physical security measures and
prevention technologies for preventing current common crimes become
8
Gavriel Schneider