100% found this document useful (1 vote)
279 views16 pages

Principles of Protection

This document outlines security procedures for protecting VIPs. It discusses establishing concentric rings of security around the protectee, with an inner, middle, and outer perimeter. The inner perimeter is staffed only by protective agents close to the protectee. The middle perimeter is staffed by agents and police, and the outer perimeter by local police. The goal is to filter access through these rings and prevent threats from penetrating to the protectee. The document also discusses establishing physical and non-physical security screens, following principles of protection like avoiding embarrassment, and techniques for agents like maintaining professionalism.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
279 views16 pages

Principles of Protection

This document outlines security procedures for protecting VIPs. It discusses establishing concentric rings of security around the protectee, with an inner, middle, and outer perimeter. The inner perimeter is staffed only by protective agents close to the protectee. The middle perimeter is staffed by agents and police, and the outer perimeter by local police. The goal is to filter access through these rings and prevent threats from penetrating to the protectee. The document also discusses establishing physical and non-physical security screens, following principles of protection like avoiding embarrassment, and techniques for agents like maintaining professionalism.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

VIP SECURITY

AND
PROTECTION
PLT JOSEL BILUGAN
SCOPE OF THE SUBJECT

1. BASIC CONCEPT OF PROTECTION

2. PRINCIPLES OF PROTECTION

3. PROTECTIVE COUNTER-MEASURE

4. SUMMARY

5. CARDINAL RULES IN VIP SECURITY

6. CONCENTRIC RINGS OF SECURITY


(SECURITY PERIMETERS)
7. ACCESS INTO SECURITY PERIMETERS
BODY OF THE SUBJECT
1. BASIC CONCEPT OF PROTECTION
ESTABLISHMENT OF SECURITY SCREENS AROUND THE VIP.

TWO (2) TYPES OF SCREEN


A. PHYSCIAL SCREEN:
1. PERSONNEL (HUMAN)
A. INNER–CLOSE-IN SECURITY
B. MIDDLE–MILITARY/POLICE UNITS
C. OUTER – INTEL, MEDICAL ADVANCE TEAM
2. NON-HUMAN
A. BARRIERS FOR CROWD CONTROL.

B. BARRIERS AROUND OFFICE / RESIDENCE.

C. TECHNICAL BARRIERS-COMMUNICATION, X-RAY MACHINES,


DETECTOR, DOGS, LIGHT, ALARMS.

D. ID / RECOGNITION SYSTEM
B. NON-HUMAN PHYSICAL SCREEN

1. INTELLIGENCE
A. BACKGROUND INVESTIGASTION

B. DOSSIERS (FILE) & RECORDS

C. CURRENT POLITICAL SITUATION

2. PROTECTIVE PLANS & PREPARATION.

2. PRINCIPLES OF PROTECTION
(THINGS TO REMEMBER IN PROVIDING PROTECTION)
1. DIGNITARY MUST BE PROTECTED FROM ALL HAZARDS WHETHER
CAUSED BY PERSONAL DESIGN, ACCIDENT OR NEGLIGENCE.
2. PROTECTION MUST NOT UNNECESSARILY INTERFERE WITH
FREEDOM EXPECTED OF A DIGNITARY.
3. PRIVACY OF THE DIGNITARY MUST BE PROTECTED.

4. PROTECTION MUST NOT CAUSE EMBARRASSMENT TO THE


DIGNITARY NOR ALLOW HIM TO BE HUMILATED OR HARRASSED.
5. TO THE EXTENT POSSIBLE, PROTECTIVE PERSONNEL MUST
ADAPT THEMSELVES TO THE CONVENIENCE OF THE VIP.
6. PROTECTION MUST NOT UNNECESSARILY INTERFERE WITH THE
OFFICIAL FUNCTIONS OF THE VIP.

3. PROTECTIVE COUNTER-MEASURE
1. PROTECTION SHOULD ANTICIPATE
A. THREATS
B. UNEXPECTED CIRCUMSTANCES
C. CONTINGENCY PLANS
2. PROTECTION SHOULD RECOGNIZE
A. POTENTIAL THREATENING SITUATION
B. POTENTIAL HUMAN THREAT
3. PROTECTION SHOULD INVESTIGATE

4. PROTECTION SHOULD NEUTRALIZE

4. SUMMARY
1. PROTECTION IS BUFFER SET-UP IN SCREENS AROUND THE
PROTECTEE TO PREVENT AN ATTACK OR ABSORB ITS EFFECTS.
2. PROTECTION SHOULD BE AN ASSET NOT LIABILITY.
3. PROTECTION MUST BE AROUND THEN VIP WHENEVER HE MAYBE
(PRINCIPLES OF 360 DEGREES PROTECTION)
4. ABSOLUTE PROTECTION IS RARELY POSSIBLE (THERE IS NO 100%
SECURITY BUT YOU HAVE TO SECURE YOUR PROTECTEE 100%).
5. PROTECTION MUST BE AS SURPRISE-PROOF AS POSSIBLE AND
FLEXIBLE TO REACT RAPIDLY AND CORRECTLY TO ANY EMERGENCY.

6. PROTECTION MUST:
ANTICIPATE, RECOGNIZE, INVESTIGATE, NEUTRALIZE

5. CARDINAL RULES IN VIP SECURITY


1. BE AWARE

2. BE SUSPICIOUS

3. BE VIGILANT
4. BE FLEXIBLE / AVOID ROUTINE
5. NEVER ASSUME ANYTHING

6. USE OF WEAPON IS ALWAYS THE LAST RESOURCE.


6. CONCENTRIC RINGS OF SECURITY
(SECURITY PERIMETERS)
IN ORDER TO PROTECT AN INDIVIDUAL, SECURE AREAS, BORDERED
BY SECURITY PERIMETER, MUST BE ESTABLISHED.
A. THREE SECURE AREAS SHOULD BE ESTABLISHED AROUND A
PROTECTEE AT EACH SITE. THE PERIMETERS ARE THEN BROKEN DOWN
INTO THREE CONCENTRIC RINGS OF SECURITY, KNOWN AS THE:
1. INNER PERIMETER

2. MIDDLE PERIMETER
3. OUTER PERIMETER

CONCENTRIC RINGS OF SECURITY

OUTER

INNER
MIDDLE
B. EACH PERIMETER ALLOWS A PROGRESSIVELY SMALLER
NUMBER OF PEOPLE THROUGH IT.

C. THESE THREE RINGS ALLOW FOR EFFECTIVE FILTERING. IF


SOMEONE SLIP THROUGH THE OUTER RING, DETECTION OCCURS AT
EITHER THE MIDDLE OR INNER RING.

D. FORMATION OF THE PERIMETER IS DEPENDENT UPON THE


THREAT, MANPOWER AND RESOURCES AVAILABLE TO A PROTECTIVE
DETAIL.
REASONS FOR PROTECTIVE
SERVICE DETAILS

• PREVENT INTENTIONAL INJURIES


• PREVENT KIDNAPPING
• PREVENT UNINTENTIONAL
INJURIES/ACCIDENTS
• PREVENT EMBARASSMENT
• MAINTAIN SCHEDULE
AGENT’S DEMEANOR
1. Be knowledgeable of protectee’s
demeanor
2. Use common sense
3. Professionalism
4. Don’t smoke, drink, chew
5. Dress or suit to fit occasion
6. Avoid drawing undue attention
7. Self-control, tact, discretion
FORMATIONS AND ATTACK
ON THE VIP
INDIVIDUAL PROTECTIVE TECHNIQUES
1. Protect yourself
2. Stance strong toward the crowd
3. Fight natural instincts
4. Know your initial instincts
5. Cover each other
6. Learn behavior and impulses of VIP
ANY QUESTION ! ! ! ! ! ! ! !
7. ACCESS INTO SECURITY PERIMETERS

A. THE INNER PERIMETER IS DIRECTLY AROUND THE PROTECTEE.


PROTECTIVE DETAIL AGENTS SHOULD BE STAFFED BY PROTECTIVE
DETAIL AGENTS ONLY. THIS IS THE MOST RESTRICTIVE OF THE THREE
RINGS AND SHOULD ALWAYS STAFFED FIRST. ONLY THOSE INDIVIDUALS
WITH A PERSONAL NEED FOR ACCESS TO THE PROTECTEE ARE
ALLOWED INSIDE, (I,e,. a protocol official, staff aid or family member)

THE INNER RING (PROTECTIVE DIAMOND)


THE MIDDLE RING (PROTECTIVE DIAMOND AND POLICE)

B. THE MIDDLE PERIMETER IS AROUND THE INNER PERIMETER AND IS


STAFFED BY DETAIL AGENTS NOT IN FORMATION OR LOCAL PLAIN
CLOTHES SECURITY OR POLICE OFFICIALS. ONLY THOSE PEOPLE WHO
NEED TO BE IN SAME PROXIMITY. AS THE PROTECTEE SHOULD BE
PERMITTED ACCESS, (i.e,. agents in the lead car, protective intelligence agents
EOD tech, embassy officials or protectee staffed). THE MIDDLE RING SHOULD
BE STAFFED AFTER PROVISION IS MADE FOR INNER RING DONOT SPREAD
THE DETAIL THIN.
C. THE OUTER PERIMETER IS THE FIRST LINE OF DEFENSE. FARHTEST
FROM THE PROTECTEE, IT IS USUALLY STAFFED BY LOCAL POLICE OR
SECURITY OFFICIALS. ONLY THOSE PEOPLE WHO NEED TO BE AT SITE
ARE GIVEN ACCESS, (i.e., SWAT, embassy staff, drivers and uniformed
police officers)
I HAVE DISCUSS TO YOU THE SCOPE
AND OBJECTIVE OF THE SUBJECT

ANY QUESTION ?

THANK YOU AND GOOD DAY ! !

You might also like