Security Newswire

Personal/Executive Protection in the Era of Mumbai

Many companies support the notion that employees are their most valuable assets, but few have actually had to calculate the actual costs associated with protection failures. Recent focus regarding the protection of executives has shifted from protection to risk management, including access to alerts and real-time information resources, threat assessments, contingency planning, travel tracking and evacuation programs and insurance to minimize financial loss and corporate exposure. The threats facing executives vary widely depending on individual and corporate wealth, company size, industry and business practices, operational environments, and culture and business partners. The most frequently targeted executives are financial/banking services, pharmaceuticals and energy, especially executives based overseas. The risks range from kidnapping for ransom or extortion, carjacking, explosives and eco-terrorism, according to experts at Andrews International..

The range of threats and the associated risks pertaining to mobility, health and family safety result in very different challenges than protecting a facility. Providing adequate protection that serves the company’s business interests, yet respects individual freedoms is often a major challenge to corporations. Four principles to guide successful protective operations and help mitigate these challenges are:

  • threat assessment
  • advance planning
  • logistics, and
  • emergency response

Threat assessment – Conduct a thorough threat assessment including research and operational activities to identify, assess, and manage environmental and specific risks, such as those associated with business practices, affiliations and partners, countries of operation, corporate and individual media exposure, controversial products or services, political or social unrest, cultural issues and individual or corporate wealth or perceived wealth.

In addition to these threats, also consider specific threat patterns of potential attackers. A recent U.S. Secret Service study on the behavior of known assailants revealed an interesting contradiction; those issuing threats typically do not attack, while attackers often do not issue threats. While you cannot ignore specific threats, the most serious threats are unlikely to be announced.

Today, special attention must be placed on kidnapping and terrorism. In many instances, these attacks may have little to do with the individual and more to do with what the victim represents, i.e., money, attention or access.

Advance planning - Advance planning requires research and travel to identify variables and contingencies to develop protective solutions. Begin with a comprehensive advance-planning process that addresses itinerary, location and transportation, including "what-where-when". The advance planning should be divided into three phases:

Phase 1 - Pre-advance - initial planning to identify the scope and objectives of the project, dates and timing, locations, key personnel and special requirements.

Phase 2 - Trip advance - finalize arrangements including contacting key participants such as hotel managers and transportation while prioritizing key aspects of the project.

Phase 3 - Site advance - physically visit each scheduled destination to finalize logistics and contingencies for each element of the itinerary. Identify specific risks and challenges associated with routes, entrances, exits and other factors, as well as surveying each location, including hotels, airports, meeting rooms, corporate offices, and outdoor venues.

Logistics - Solid logistical planning dictates that you thoroughly understand requirements, where and when you need them, and the most efficient process to maximize the use of personnel, vehicles, and equipment. You should incorporate logistics that cover:

Information infrastructure – the ability and flow of effective communications relies heavily on technology and protocols established for transmission, receipt, processing and exchange of information with the protection team, executives, corporate contacts, vendors, suppliers, and third-party practitioners.

Strong integration – success requires complete operational integration with agents, vendors, suppliers, and others to support protection by identifying roles and responsibilities and ensuring the resources, authority and accountability necessary for success.

Emergency response – Despite thorough threat assessments and advance planning, security must be prepared to respond. This requires consistent, realistic training focused on the most common occurrences, such as medical emergencies, as well as rare attacks.

Effective risk management and protection requires balancing business and security objectives, personal freedoms and threats, and planning and response. Professionals should be prepared to protect and react in normal and emergency situations by ensuring that proactive threat assessments, planning, and logistics have been properly handled, and by identifying and planning for every possible contingency to avoid threats and reduce risk.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine March 2015 issue cover

2015 March

In this March 2015 issue of Security check out our product preview of ISC West 2015. Also, learn how to make the best use of your security technology by working with your security integrator, get info on penetration testing, and discover how white glove security can enhance bottom line real estate value.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.