Deatherage / Deatherage, Jr. | Security Operations | Buch | 978-0-367-68836-3 | sack.de

Buch, Englisch, 268 Seiten, Format (B × H): 155 mm x 234 mm, Gewicht: 386 g

Deatherage / Deatherage, Jr.

Security Operations

An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

Buch, Englisch, 268 Seiten, Format (B × H): 155 mm x 234 mm, Gewicht: 386 g

ISBN: 978-0-367-68836-3
Verlag: CRC Press


Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding of the basic concepts and rules that need to be followed in protective services, including what comprises good security practice. This second edition is fully updated to include new case scenarios, threat vectors, and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced, sophisticated schemes.

Security has always been a necessity for conducting business operations in both low- and high-risk situations, regardless of the threat level in the operating environment. Overseas, those with new ideas or businesses can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States, people become targets because of positions held, publicity, politics, economics, or other issues that cause unwanted attention to a person, their family, or business operations.

Security Operations, Second Edition provides an introduction to what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail.

FEATURES

• Identifies what can pose a threat, how to recognize threats, and where threats are most likely to be encountered

• Presents individuals and companies with the security and preparedness tools to protect themselves when operating in various environments, especially in high-risk regions

• Provides an understanding of operational security when in transit: to vary route selection and keep destinations and movement plans out of the public view

• Outlines the tools and techniques needed for people to become security conscious and situationally aware for their own safety and the safety of those close to them

An equal help to those just entering the protection business or people and companies that are considering hiring a security detail, Security Operations is a thorough, detailed, and responsible approach to this serious and often high-risk field.

Robert H. Deatherage Jr. is a veteran Special Forces Soldier and private security consultant with thirty years’ experience in military and private security operations. His various writings on security topics cover security operations, threat assessment, risk management, client relations, surveillance detection, counter surveillance operations, foot and vehicle movements, and building security—blending solid operational theory with practical field experience.
Deatherage / Deatherage, Jr. Security Operations jetzt bestellen!

Zielgruppe


Academic, Professional, and Professional Practice & Development

Weitere Infos & Material


ACKNOWLEDGEMENTS

AUTHOR

INTRODUCTION

CHAPTER 1 WHY USE A PSC PROVIDER

CHAPTER 2 PROVIDING PROTECTION

Protection Strategies

Roles of a Protection Specialist

CHAPTER 3 THE CLIENT

Who Is the Client?

Ethical Considerations

CHAPTER 4 SECURITY ON A BUDGET

CHAPTER 5 COMPONENTS OF PROTECTION

The Bodyguard (BG)

Advance Work

The Personal Security Detail (PSD)

The Close Protection Team

CHAPTER 6 COMPOSITION OF THE SECURITY DETAIL AND THEIR RESPONSIBILITIES

Terms and Definitions

CHAPTER 7 KNOWING THE THREAT

Where Does the Treat to Us and Our Clients Come From?

Range of Threats

Internal Considerations

External Considerations

Needs Of The Threat

CHAPTER 8 RISK MANAGEMENT

Risk Assessment and Reduction

Threat Assessments

Vulnerability Assessment

Risk Assessment (Combining It All)

CHAPTER 9 THE ADVANCE

Responsibilities Of The Advance

Pre-advance Work

Location

Keys to Successful Advance Work

CHAPTER 10 SURVEILLANCE DETECTION PROGRAM

Types Of Surveillance

Methods Of Surveillance

Anti-Surveillance Techniques

Counter Surveillance

Setting Up Counter Surveillance

CHAPTER 11 AWARENESS LEVELS FOR THE SECURITY PROFESSIONAL

CHAPTER 12 SITUATION AWARENESS

Tactical Mindset

CHAPTER 13 GENERAL GUIDELINES FOR PSD OPERATIONS

CHAPTER 14 FOOT MOVEMENT TACTICS AND TECHNIQUES

One-Man Detail

Two-Man Formation

Five-Man Formation (Modified Diamond)

Five-Man Formation (Modified V)

Six-Man Formation (Diamond)

Foot Detail (Open)

Foot Detail (Close)

The Security Detail’s Mission

CHAPTER 15 PUBLIC VENUES AND FUNCTIONS

Public Speaking Venues

Reception Lines

Entering Elevators and Other Enclosed Spaces

Security Setup for Approaching an Elevator

Security Setup for Entering an Elevator

Security Setup Inside an Elevator

CHAPTER 16 ROUTE SELECTION

Route-Planning Principles

CHAPTER 17 THE PHASES OF ROUTE PLANNING

Selection of the Route

Organizing The Movement

Hostile Environments or Warzones

CHAPTER 18 MOVING THE CLIENT

Identify the Routes

CHAPTER 19 MOTORCADE OPERATIONS

Terms and Definitions

Vehicle Embus And Debus Procedures

Reacting To An Attack While Moving

Choosing The Right Vehicle for the Mission

Armoring Vehicles

High Profile Vehicles

Convoy Equipment

CHAPTER 20 CAR OPERATIONS AND TACTICS

Traffic Circles

Vehicle Reception of Two-Car Motorcade

Two-Car Moving Roadblock Escape

Two-Car Stationary Roadblock

Three-Car Operations and Tactics

Three-Car Turns

Lane Changes

Approaching and Passing through Intersections

Vehicle Reception of Three-Car Motorcade

Reacting to Attacks at the Embus/Debus Point

CHAPTER 21 THE COUNTER ATTACK TEAM (CAT)

Mobile Role

Static Role

Mobile Operations Procedures

Static Site Operations

CHAPTER 22 COUNTER SNIPER OPERATIONS

Counter Sniper Equipment

The Counter Sniper Team

The Firing Position

Control of the CS Team

Reporting SOP for the Counter Sniper Team

Location Reporting

Reporting Individuals

Reporting Vehicles

CHAPTER 23 BUILDING SECURITY CONSIDERATIONS

External Considerations

Internal Considerations

Other Considerations

Outer Layer Security

Inner Layer of Security

Temporary Site Security

CHAPTER 24 BUILDING SEARCHES

Route (Line of Advance)

APPENDIX A TYPES OF SURVEYS

General Site Survey

Remain Overnight (RON) Site Survey

Airport Survey

Hospital Survey

Example General Site Survey

Example Facility Checklist

Example Remain Overnight (RON) Hotel Survey

Site Security

General Notes

Example Airport Survey

Example Hospital Survey

Basic Physical Security Checklist

Options for Vehicle Security

Options for Perimeter and Access

APPENDIX B VEHICLE-ORIENTED IED SEARCH CHECKLIST

APPENDIX C PERSONNEL SEARCH TECHNIQUES

General Search Technique

Types of Search

Always Remember

APPENDIX D ROUTE SURVEY FORMAT

Route Details

Assets Required

Service Support

Command and Control

Any Additional Information

APPENDIX E SECURITY DETAIL OPERATIONS ORDERS

Visual Aids

Protection Orders Example Format

The Delivery of Orders to Personnel

Conclusion

APPENDIX F OBSERVATION

Suicide Bomber Indicators

Potential Props

Local Area Indicators

Individual Behaviors

Vehicular Indicators


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.