Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsPhysicalCybersecurity Education & TrainingPhysical Security

Education & Training

The Prevention Partnership: Executive Protection & Behavioral Threat Teams

It’s not just sunglasses, earpieces and motorcades. Real protection starts long before the threat gets close, and that’s where the other half of the equation comes in.

By Ben Zeifman
Executive Protection & Behavioral Threat Teams
Tom Merton / OJO Images via Getty Images
October 8, 2025

Executive Protection (EP) is a term that is thrown around, but at its core, it is the protection of human life from soft tissue damage; think of it as a human shield, the final two feet and the last two seconds prior to an attack. Most people picture a stone-faced figure, wearing sunglasses, whispering into their sleeves. Hollywood has done a great job selling that image. Professional Protectors are charged with advance work, planning motorcades, protective formations, and much more. They put their life on the line to protect another; it is a heroic and admirable profession.

Some of the best Protectors that I have worked with over my career can think three steps ahead and outside of the box. They are problem solvers. They excel at situational awareness and operational execution. In advance work, for example, it’s all about relationships. I recall a time when I spent days in advance of a client at a multi-national event. I drove, walked and assessed every route, every checkpoint and every potential obstacle. I had every possible credential needed and I was ready. What I didn’t anticipate was a shift change for the venue security at the vehicle checkpoint. I became friends with “Bob” who knew we were coming and was ready. What I didn’t know was that “Bob” took his break and “Sam” was there when we arrived. “Sam” didn’t know who we were and caused a significant delay in our entrance and embarrassment for the Protectee.

The challenge is that this is only half the story. Without a steady IV drip of intelligence, risk mitigation and threat assessment, Protectors do not have all the tools in their toolbox to be effective, often playing catch up. Think Riggs and Murtaugh, The Blues Brothers, Tina Fey and Amy Poehler… you get the point.

Behavioral Threat Assessment and Management (BTAM) is the other side of the equation. This approach focuses on identifying, evaluating, and managing individuals who may be on the Pathway to Violence, a concept created by Frederick Calhoun and Stephen Weston. They study patterns in behavior, monitor escalating rhetoric, and drive intervention hopefully before someone crosses the line from concerning, to dangerous. The most successful programs are multidisciplinary teams, comprised of experts in mental health, law enforcement, corporate security, legal and HR.

Better Together

Protectors keep people physically safe and create uninterrupted ease of movement. BTAM works to monitor threats and flag concerning behavior, which could materialize. Each discipline can operate independently, however, together, they can accomplish so much more.

Think of it like this. BTAM is like radar spotting trouble miles away, and Protectors are the missile defense system ready to stop it. Without radar, you’re just guessing and hoping nothing sneaks up. Without defense, all you can do is watch the blip inch closer and silently panic while sipping your coffee. One of my mentors, James Hamilton, a former FBI Supervisory Special Agent and the creator of the FBI’s Close Protection School, says it best, “Hope is not a successful strategy.”

When these programs work together, the flow of information goes both ways. BTAM may identify someone who has been making concerning statements on social media towards a Protectee. Conversely, Protectors may identify someone at a public appearance that is displaying concerning behaviors or PINS (Pre-Incident Indicators). This information is shared with the multidisciplinary team who can do a deeper dive, often revealing a larger risk pattern.

What is a viable plan or approach to reducing risk?

  • Utilizing Structured Professional Judgment (SPJ) to guide assessments. This systematic approach evaluates information and helps determine levels of risk.
  • Focusing on the Pathway to Violence. Study individuals’ actions, plans, communications, and intentions.
  • Revised Protective Strategies. Protectors can adjust staffing levels for known public appearances, implement surveillance detection, increased focus on areas of mandatory travel and limit time in or around vehicles.

 Targeted attacks are prevented by robust teams of professionals. All of these roles; Protectors, Threat Assessment Experts, Investigators and Protective Intelligence Analysts work in concert to reduce risk.

Reading the Signs: From Leakage to Learning

A public figure receives concerning communication from an unknown individual. In threat assessment terms, this is referred to as leakage – when a person reveals their intent or mindset before taking action. Leakage doesn’t always guarantee violence, but it does raise the level of concern and would benefit from provoking a joint assessment.

Leakage can come in various forms:

  1. Verbal – An employee mutters, “The CEO is going to regret not giving me a raise.”
  2. Written – Social media posts, email, letters, etc.
  3. Behavioral – Showing up at events, sending gifts, or attempting proximity.

One can interpret that leakage stems from a Pursuer’s need to air frustrations, pursue validation, or test protective responses. Not every social media post indicates an immediate threat, but each provides crucial insight into a Pursuer’s thought process.

To borrow from pop culture, think back to Seinfeld and the made-up holiday of “Festivus”. One of its traditions? The Airing of Grievances. Everyone sits around the table sharing complaints about one another’s actions. It’s funny on TV, but in the real world those grievances, when aimed at a public figure, are exactly the type of signals a BTAM team would want to assess.

Now that we’ve learned that information, where does this information go? Ideally, into a central clearinghouse. A centralized hub ensures the various teams tasked with reducing risk and preventing targeted violence have access to all materials instead of remaining siloed and only having snippets of fact. It’s the difference between everyone holding puzzle pieces in separate rooms versus sitting at the same table and completing the picture together.

With shared information, BTAM teams can leverage various partners such as Investigations or Protective Intelligence to dig deeper into the individual’s background, stressors, and possible escalation pathway. More context allows us to better understand the individual, their unique situation, past behavior, criminal history, social media footprint, or other factors driving their outreach ultimately developing a more targeted response.

Turning a blind eye and hoping this concerning behavior goes away? Not a valid plan. Gavin de Becker shares in his best-selling book, The Gift of Fear, that “the passage of time does not automatically diminish the threat of a potentially violent individual.” In fact, he reminds us that threats emerging later in a conflict may be even more dangerous, calculated, deliberate, and intentional, rather than impulsive.

Reactive vs Proactive

The reality is that targeted violence is rarely spontaneous. There are almost always observable concerning behaviors that show up on the Pathway to Violence prior to an attack. How many times have we heard post incident, “I knew something was off with that individual” or “he’s been acting weird for a long time.” Research shows that many attackers have told someone about their plans prior to acting.

Protectees who are only traveling with Protectors on the ground, often a single Protector, do not take advantage of the network of subject matter experts who can anticipate and manage threats. Often there are outside factors that can alter a Pursuer’s trajectory on the Pathway to Violence, and we must catch them early. Effective collaboration between these teams relies on open and regular communication to ensure timely and accurate information sharing about potential threats.

Great, now what? When Protectors are aware of potential threats or Pursuers they can put mitigation strategies in place. They can make recommendations alter arrival/departure locations, limit areas of predictability, create white space or facilitate secure transportation. For context, white space is physical distance that is created between the Protectee and potential threats.

Here is a great example of thinking outside the box. If a Protectee enjoys getting a cup of coffee from their favorite spot on the way to the office every day, that location now becomes known and predictable for someone seeking an inappropriate encounter. What if the Protectors get that coffee on the way in and have it ready in the car before the Protectee even gets in? What did we accomplish; setting the standard of completing service-related tasks, which we generally want to avoid? I’d argue not. I would suggest that we just created an opportunity to reduce risk. The Protectee no longer has to get out of a secure space (the vehicle) and enter a potentially known location, in which someone seeking to air the grievances or worse, bodily harm, can act. All of this is being driven by assessments and information received.

Keeping Score

Are we able to measure that success or keep track of the encounters we’ve prevented? No. Our successes are often never known, but we must rely on our programs and partnerships (Executive Protection + BTAM) to complement each other in our zero-fail mission. Neither discipline works best alone, there is power in this partnership.

Targeted attacks are prevented by robust teams of professionals. All of these roles; Protectors, Threat Assessment Experts, Investigators and Protective Intelligence Analysts work in concert to reduce risk. We protect by trusting our instincts, acting on intelligence, and combining our skills. The real measure of success is simple: nothing happens. And that’s exactly the goal.

KEYWORDS: executive protection intelligence sharing risk assessment risk management security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ben zeifman

Ben Zeifman, CPP has been in the law enforcement and security industry for more than 20 years. He currently serves as the Director of Client Services for Gavin de Becker & Associates. He has worked with the U.S. Secret Service, the Diplomatic Security Service, State Police and the FBI during the planning and implementation of security operations involving at-risk clients, U.S. Presidents, and foreign heads of state. Zeifman has consulted on the development of protection strategies regarding difficult terminations and reductions of force at Fortune 500 companies. He holds a Bachelor of Arts degree in Social and Criminal Justice. He is President of the Southeast Chapter of the Association of Threat Assessment Professionals (ATAP), and he has been certified by the American Society of Industrial Security as a Protection Professional (CPP). Image courtesy of Zeifman

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Person holds white cellphone

    The role of mobile security in executive protection

    See More
  • SEC0521-Loss_Feat-slide1_900px

    The state of loss prevention and asset protection

    See More
  • person in bubble

    The ins and outs of launching an executive protection program

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • Physical Security and Environmental Protection

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing