Take a fresh look at your lifestyle.

Defensive Surveillance for Executive Safety

33

Protective Surveillance

Protective monitoring is the creation of an inconspicuous security team around a person or group. Normally made up of highly trained and experienced concealed operators, this team types a protective bubble around the client in a covert way. Find the Best Sweep Service.

The protective surveillance group (PST) will carry out counter-surveillance by watching those that might be watching the client. Their primary aim is to occupy or even control spaces and regions that would be used by an unpredictable surveillance team.

Allowing them, through their expertise along with experience, to identify them. Various other roles are to act as a simple reaction force (QRF) and since protective intelligence.

This article will examine protective surveillance and its purpose in executive protection along with high-risk protection. It employs two real-life case reports to identify how protective ccd can be used as an extremely effective instrument in executive protection.

The reason why would hostiles use pre-attack surveillance?

Hostile individuals or even groups need to gather cleverness on their target. To increase the likelihood of a successful attack, it is vital to understand the comings and goings of a target, their routines, and routines. What protection they have, its strengths and weaknesses.

Do you know the opportunities and threats? The hostile surveillance team is going to be trying to answer all these points and more. It is with this info that they can formulate a plan in order to attack their target better and with a greater chance of achievement.

Identifying threats early is essential to ensure time to react. In case one has time to react, then your chances of a favorable outcome tend to be increased dramatically. It is just action vs . reaction. Any kind of aggressive force with the benefit from surprise and tactical arranging is more likely to succeed. Their motion occurs at the time of their deciding on.

Very few aggressors will episode if they don’t feel they also have the upper hand, this is probably the result of some sort of planned operation and therefore the unpredictable team will likely be prepared correctly.

Close Protection

A normal close protection staff (CPT) will have a multitude of responsibilities and duties to perform that we demand we have their undiluted attention. Their very own focus must be on the present, able to react at a second’s notice to the immediate hazard.

They provide the necessary ‘close’ security. This however is also a probable weakness. Even highly trained travel operators will still need the perfect time to react to an action.

This means they can be immediately on the back foot or so and will be until they get back the initiative and gain the fight. A number of variables and variables then get played, the skill from the security team, the ability of the attackers, type of assault, and even luck to name a few.

The CPT cannot be protective monitoring but they can carry out counter-surveillance and effect actions to find out whether they may be under monitoring. It is the author’s opinion nevertheless that effective counter-surveillance can simply be undertaken as a fully covert separate entity.

To obtain complete separation to the CPT and be in no way linked after some time or by proxy to attenuate the chance of being compromised. Furthermore, counter-surveillance is not easy and requirements to be a focused effort.

A single cannot carry out effective counter-surveillance at the same time as focusing on dignitary protection or bodyguard duties. It is also far more likely a CPT will actually be carrying out anti-surveillance, not counter, the majority of the time period.

What is the difference between counter and counter-surveillance?

Anti-surveillance is when a person who suspects that he is being followed performs certain actions in order to determine whether there is a surveillance group or individual following your pet and confirm that he is becoming followed, by drawing them into a position where they might be identified.

Counter-surveillance is every time a third party carries out actions so as to identify in a covert method whether an individual is being put into practice and by whom. This can come about with or without the knowledge of the man or woman being followed.

In a nutshell, anti-surveillance is what we would do ourselves to identify surveillance and counter-surveillance is when we would receive someone else to help us discover it.

Hostile Surveillance Discovery

Accurately and efficiently figuring out surveillance, like all things amounts to a large number of variable factors. Typically the skill of the surveillance staff and the skill of the anti/counter surveillance operators are the significant factors.

It is very easy to seem but actually quite difficult to see. Many close protection authorities have only done, for the most part, a brief week or two regarding surveillance training. In most cases, this is certainly just not enough to have a thorough ability to identify organized security teams.

A trained hostile security team should be able to identify anti-surveillance and avoid it. This is exponentially boosted even further if the people undertaking the anti-surveillance do not know the way they are looking, especially so if these are in a foreign environment.

Successful counter-surveillance on the other hand is hard to distinguish, let alone avoid. The dangerous surveillance team will (if done correctly) never know they’ve been spotted. The PST really should remain covert at all times soon after identifying that a hostile CCTV team is showing interest in it in the client, would endeavor to do the following:

• Explain to the close protection team so a covert removal of your client to a safe environment is definitely carried out quickly but with no highlighting that a threat has been identified.

• Aim to stick to the surveillance team to gather brains on them so that the necessary government bodies can deal with and extinguish the threat.

• In the event the threat is perceived as getting imminent the PST can easily react accordingly as educated close protection officers.

High Risk

To get a high-risk client protective security is a necessity, not an extra. It is imperative a security and safety team is proactive instead of reactive. Too many times story has shown that systems usually are put into operation too late. Concluding the gate once the moose has bolted is too the phrase heard.

When it comes to high-risk clients, protective surveillance ought to only be used in conjunction along with a close protection team. The two competitors though separate are symbiotic. They work hand in hand to the shared goal of keeping the consumer safe and secure.

A PST itself would be able to identify threats early on and act accordingly, still, they would rarely be close up enough to protect the client from your impromptu attack or behave as a last resort. This is why the two clubs work perfectly together, each and every with a different task but entirely interlinked.

Let us check out two real-life cases, highlighting where protective security would have fitted perfectly together with close protection to help engineer a really different outcome.

Assassination

The particular Colombian former interior minister Fernando Londono in Bogota was attacked during a car convoy. His two automobile convoys were held at a pair of lights (one free side of the road to its left, 2 free lanes to the right) A bus after that joined the left street followed by cars to the left as well as right.

Then a man lasts longer than the street approximately 20-meter distances behind the cars carrying a big object. He circles around the bus and approaches Fernando Londono’s car attaching the limpet mine to the left top side.

Within 30 seconds the actual mine explodes, leaving 2 dead and 48 hurt. Fernando Londono was really fortunate to survive, his degree 5-armored car played a substantial part in this. Some of their security detail was not and so lucky.

It seems highly very likely that the attackers in this instance may have had to have put Londono underneath prior surveillance to establish the routes, what car they travel in, what safety measures he has with him, can he have a pattern involving life.

Where best to accomplish the attack and how to break free (the attacker ran along an alley to a patiently waiting motorcycle). A multitude of questions will have to have been answered to carry out this attack. Protective surveillance may have most likely identified hostile correction and highlighted the imminent episode planning.

Further, a PST follows the client at a long distance to observe the surroundings. There is a great chance that the team might have spotted a car tailing the customer and more so an individual transporting a large suspicious object actively walking towards the client’s automobile. As mentioned earlier identifying risks early is vital to allow time for you to react.

To further delve into the case study, Londono survived as well as was removed from the vehicle (via the trunk) injured as well as dazed within 30 seconds.

Their surviving close protection officers do a great job of extracting him or her through the crowd. What if right now there had been a second wave episode though? Let us imagine that typically the attackers had mounted a smaller arms assault post huge increase.

QRF

There is a good probability the surviving officers may have been overpowered due to their tension and the focus on removing the main. A PST also will act as a Quick Reaction Force (QRF) and would have been able to maneuver in and work in order to win the fight in order to defeat any secondary or even tertiary attack.

Thus offering the necessary cover and assistance so the CPOs could take away to the protective surveillance’s automobiles and extract the client.

The QRF does exactly as their namesake; it is a force (in this case a PST) capable to react quickly in case of an urgent situation. The covert nature of the team would be disregarded from time to time of extremes to act being a suitable support team.

No matter if this is as an invasion team, a medical assistance team, or a removal team. The fact that they would always be covert right to the last time provides an extra level of shock and advantage to the safety detail.

As can be seen, the actual PST’s main focus is actually pre-empting danger and offering time to react. Ensuring that there is nothing a surprise. Its secondary concentrate is acting as an assistance team able to react appropriately in times of emergency.

Kidnap

Another case study is that of Edelmiro Manuel Pérez Merelles. He was snatched after a number of assailants hindered his vehicle, killed his / her driver/bodyguard, and fled having him in tow. This has been by all accounts a new planned and well-prepared strike. They didn’t hesitate to be able to kill his bodyguard and also carried out the attack facing witnesses.

The bodyguard got no time to react. When protective surveillance had been set up, there is a good chance the particular attack would never have taken place. The assailants would have completed some surveillance to work out their routine, routes, and car.

They would almost certainly have had to abide by him to mass the vehicle then in. These things would have been identified ahead of the attack and often allowed the bodyguard and PST to react accordingly to avoid the threat.

Worst-case scenario, along with the attack has already transpired, the PST would have been able to reach for a QRF and provide support to the bodyguard. The benefit of remaining hidden; the PST would have an advantage., an action vs . an effect.

There are clearly worthwhile benefits of the implementation of a PST, or at the very least effective table surveillance. For high-risk clientele, it is imperative that safety teams focus on pre-empting threats, allowing time to react.

When protective surveillance teams can be used, when or if a consumer does attract the undesired attention of hostiles devoted to causing harm to the principal as well as their family it will appreciably improve the chances of favorable results.

Read Also: Security Devices – Some Good Choices In Security Products