Covert executive protection

Whether within the US or on the streets of Bangkok, while protection may be required, open bodyguards or close protective equipment may not serve the purpose of the trip. Certain customers want low-profile protection, not wanting the attention that comes from having an open computer nearby at all times. Sometimes having an open team can highlight status by making someone a target where they may not have been before. Sometimes there is a higher level of risk and additional protection is required. Whatever the reason, there are cases where covert executive protection can serve as a very effective “personal protection” tool that regularly provides and exceeds the necessary security.

Covert executive protection is obtained through the use of protective surveillance equipment. Protective surveillance is the creation of a discreet security team around an individual or group. Typically comprised of highly trained and experienced undercover operators, this team covertly forms a protective bubble around the client.

Protective Surveillance Team (PST) will focus on the following to ensure customer safety.

1. Counter-surveillance

2. Protective intelligence

3. Protective security duties

4. Quick reaction force

5. Medical emergencies

1.) Counter-surveillance

The Protective Watch Team (PST) would keep an eye on those who might be watching the client. Its main objective is to occupy or control areas that would be used by hostile individuals or groups. Through their skill set and experience, they would remain undercover, identifying and assessing any threats to the client.

What is counter surveillance? It is the process by which a third party takes actions to covertly identify whether an individual is being followed and by whom.

Many people ask why people would put me under surveillance.

Hostile individuals or groups need to gather information about their target. To increase the chances of a successful attack it is vital to know the comings and goings of a target, their habits and routines. What security they have, their strengths and weaknesses. What are the opportunities and threats? A hostile surveillance team will try to respond to all of these things and more. It is with this information that they can formulate a plan to attack their target more effectively and with the greatest chance of success.

Surveillance can range from the crude and brief that a random assailant or attacker may use just prior to their hostile action, to the high-level, professional, and extended surveillance that potential hijackers may carry out.

Early identification of threats is vital to ensure reaction time. If one has time to react, the chances of a favorable outcome increase dramatically. It is simply action vs. reaction. Any aggressive force with the advantage of surprise and tactical planning is more likely to be successful. Your action occurs at the time of your choice. Very few aggressors will attack if they do not feel they have the advantage, they do so at the time of their choice, this is probably the result of a planned operation.

If hostiles conduct pre-attack surveillance, the PST will spotlight them, identify the risk, and then react accordingly, doing some or all of the following:

• If the threat is perceived as imminent, the PST can react accordingly as trained escort officers. Provide customer security and remove it from the threat.

• Approach the client, inform him of the threat and remove him to a safe place in a controlled and covert manner.

• Try to follow the hostile surveillance team to gather intelligence on them so that the necessary authorities can face and extinguish the threat comprehensively. All while guaranteeing the total security and protection of the client.

2.) Protective intelligence

Protective intelligence is the other vital tool in protecting an individual or group and is the process by which the PST identifies, investigates and analyzes threats to the client.

This is a constant process that starts from the beginning of the task and flows to the end. Both before and during the trip, the PST will anticipate threats and analyze risk. Previous preparation and planning are vital to minimize and manage risk; it is through foresight and knowledge that the PST can prepare and react effectively.

It is through protective intelligence that the PST’s protection security duties can be shaped and tailored to ensure the highest level of security and protection is provided to the customer.

3.) Protective security duties

Protective surveillance teams are made up of highly trained escort officers. Although not in their usual role of ‘bodyguard’, they still operate with the sole intention of keeping the client safe from harm. The very nature of protective surveillance requires the team to blend in with its surroundings without being noticed by any hostile surveillance. This, in turn, provides a greater chance for hostiles to lower their guard and show themselves through their actions or reactions. However, this means that the PST will be at a greater distance from the customer than normal personal protective equipment would be.

Therefore, they would not be walking alongside a client where the “relationship” could be easily identified, but would be very close. Close enough to react if a threat was presented, but far enough to remain in a low profile and allow the client to continue with their lives without the attention of a ‘bodyguard team’.

The protection security duties of a PST are exactly the same as those of a close protection team, but without the proximity and overt nature. Their reason for being, their whole purpose and focus is to ensure the safety of the client (and if applicable, their family) at all times. The PST would do this, using their skills and experience to make sure they don’t suffer any harm.

A precise definition of personal protection is:

The role of close protection encompasses ALL aspects of protection measures that work together: physical and technical combined with constant careful planning and sound operating procedures to deny / minimize risk or threat of kill / injure / harm risk to another in any way.

Richard J Aitch: Close Protection: A Closer Look at the Protection Equation. 2012

This definition mentions all aspects of protection measures that work together: physical and technical. We just touched on the physical side of things. What about technique? There are certain technical security solutions that, when used effectively, can aid in overall customer security.

Technical surveillance sweeps and countermeasures they are vital to ensuring that hostiles do not have access to confidential and restricted information. Maps, routes, itineraries and meetings must be kept confidential. Mobile phones, hotel rooms, vehicles, meeting rooms, and computers must be kept safe from eavesdropping devices, covert cameras, and technical attacks. The client and his family may want to be tracked and monitored using covert methods to help in the event of a kidnapping or kidnapping. If a security team can react quickly and effectively to a threat, the chances of a favorable outcome are much more likely. Hotels can be more effectively protected with hidden cameras, motion detectors and panic alarms. There are a multitude of technical security solutions available and these can be tailored to specific requirements and situations to work symbiotically with physical security.

4.) Quick Reaction Force (QRF)

A QRF does exactly the same as its namesake; it is a force (in this case the Protective Surveillance Team) capable of reacting quickly in an emergency. The covert nature of the team would be ignored at extreme times to act as an emergency support team. Whether as an assault team, a medical support team, or an extraction team. The fact that they were undercover until the last minute provides an extra level of advantage that surprises hostile individuals or groups, putting them in the rear.

5.) Medical emergencies

A protective surveillance team should have at least one qualified and experienced physician with access to a complete trauma medical kit. Thus allowing an effective and timely response to any emergency medical situation. In certain countries and areas, definitive prehospital care may not be readily available. In medical emergencies, the chances of a favorable outcome are dramatically increased if timely and effective medical care is provided.

Covert executive protection without the protector’s knowledge

Another form of covert protection can be used without the client knowing they are being protected. This is often used in cases of spouses or children who may be at risk of kidnapping or kidnapping but do not know the risk for whatever reason, or guardians require a greater degree of reassurance. High net worth individuals and celebrities, for example, may have close protection equipment, but their children or partners do not have or want it. However, the risk still exists. Kidnappings and kidnappings are a significant risk for these people.

Although it does not provide the level of protection that a Close Protective Team does, the PST is perfectly suited to this requirement, it allows a spouse or parent to have complete peace of mind that their loved one is being watched and protected by a highly professional team.

Executive protection, personal protection, protective vigilance, bodyguards, whatever the terminology used, always remains a constant; that each customer will have unique requirements and that every security detail must be adapted to these. As mentioned above, the sole focus, the rationale for any security detail, regardless of how it is composed, is the health, safety, and protection of the customer as your top priority.