NCJ Number
100378
Date Published
1984
Length
13 pages
Annotation
Executive protection against terrorist attacks involves threat assessment, protective details, technical security, and intelligence acquisition.
Abstract
One step in threat assessment is threat modeling, which involves defining potential adversaries' assets and tactics. Other steps are the collection of data about the target from the perspective of the adversary, the formulation of attack scenarios, a vulnerability study, and the implementation of countermeasures. The development of a protective detail consists of the selection of qualified agents to protect the person, the establishment of a command post to monitor the movements of the protected person, and the use of an advance team or person to survey areas to be visited by the protected person. Each circumstance has unique technical security requirements that generally involve communications among security personnel, physical security, surveillance countermeasures, protection against explosives, and bullet-resistant materials. Intelligence acquisition should focus on the projected tactics of potential adversaries. Primary information sources are police, private information sources, and news media.