Protective Operations A Handbook for Security and Law Enforcement Protective Operations A Handbook for Security and Law Enforcement Glenn P. McGovern Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-13: 978-1-4398-5172-2 (Ebook-PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Preface ix Acknowledgments xiii the Author xv Introduction xvii 1 Breaking the Mindset 1 2 Policy and Procedure Considerations 5 Use of Force 5 Leaving the scene of a shooting 7 Duty to Provide Medical Attention 8 Leaving the scene of a Collision 9 Use of Impact Weapons and Pepper spray 9 emergency Vehicle Use 10 Code 3 equipment 10 Qualified Immunity 11 specialized Vehicle Uses 11 specialized Weapon Use 12 explosive Device Incidents 13 endnotes 15 3 Weapons, Vehicles, and equipment 17 Basic equipment 18 Pistol 18 submachine Guns 19 Long Guns 20 shotguns 21 scopes 22 edged Weapons 22 other equipment 24 Medical Considerations 24 Vehicles 27 v Contents Vehicle Maintenance 28 Manufacturing Issues 30 endnotes 32 4 training for the Adversary 33 Physiological/Perception Changes and effects on the Human Body 35 Basic Concepts 37 Immediate Action Drills 37 Fire superiority 38 Breaking Contact 39 Prolonged engagements 40 Ammunition Concerns 40 types of Attack to train For 41 training the team 43 Close-Quarter Battle 43 Gunfighting 45 Counter sniper 47 edged-Weapon Attack 49 Counter Booby trap 51 Counter swarming 57 shooting from a Vehicle 58 Motorcycle-Based Attacks 60 trauma Response 61 Hand-to-Hand Basics 62 tactical Driving 68 Practical exercises 73 training to Conduct an Attack 75 endnotes 75 5 Assessing the Risk and threat of Hostile organizations 77 Assessing a Hostile organization 82 the “What if” Analysis 89 the “Red team” Analysis 90 Predictive Analysis 91 the targeted Attack Cycle 92 endnotes 97 vi Contents 6 the Protective Advance 99 static Locations 100 In transit 102 sniper threat 108 threats from explosives 110 endnotes 112 7 operational security (oPseC) 113 Counterintelligence 116 Routes and Advance Planning 120 safe Houses 121 team and team Member oPseC 123 situational Awareness 125 endnotes 128 8 overt versus Covert Details 129 endnotes 136 9 surveillance Detection 137 surveillance Basics 140 the surveillance Detection Process (static and Mobile) 145 Behavior Patterns 151 Running the surveillance Detection operation 151 Analytical Function 153 surveillance Detection Combined with Protection 154 Passive surveillance Detection 154 training for surveillance Detection 156 endnotes 157 10 Levels of Protection and the Cessation of Protection 159 endnotes 179 11 Conclusion 181 vii Contents Appendix A: Law enforcement Protective operations—suggested training and Reading 183 training 183 explosives 183 snipers 184 Driving schools 184 surveillance Detection 184 threat/Risk Assessment 184 Reading 185 Documentaries and Films 186 Appendix B 187 Personal security tips 187 At the Residence 187 Key Control 188 If a stranger Is at Your Door 188 telephone Calls 189 Intruders 189 Returning Home 189 Walking/Jogging/Running 190 Driving 190 Parking 191 Automated teller Machine (AtM) 191 Public transportation 191 At Work 192 If a Hostile Individual Approaches You 192 Adversary Intelligence sheet 193 Medical Form 194 Risk Model Worksheet 195 oPseC spreadsheet 196 Index 197 viii PReFACe Approximately nine years ago, after taking a position as a criminal inves- tigator with the one of the largest district attorney offices in California, I became involved with the special operations group that was tasked primarily with conducting protective operations for the staff as well as victims, witnesses, and informants. As a former SWAT operator with my last department, it was a natural fit. At around the same time, another investigator was hired who had been a SWAT/sniper with his last depart- ment. Surprisingly for both us, of the approximate 10 investigators in the unit, only two others were former SWAT, one of whom was the soon to be commander of the unit. The rest of the team, while all very experienced law enforcement professionals, had limited specialized tactical training, the exceptions being a former army ranger and a former state narcotics special agent. Out of the whole team, only three of us, including myself, had attended a basic dignitary protection course. Fortunately, the team had a wide selection of weaponry including fully automatic submachine guns in three different calibers, assault rifles, and shotguns with which to work. The training initially began with the basics, motorcade operations, and the various pedestrian protective rings. With access of a facility that allowed vehicles to be brought up on the fir- ing range, as well as a large tire house, we were able to evolve the training to live fire scenarios. The problem that quickly became apparent was that there was not much information available on what to train for beyond the basics. Specifically, what type of attacks could be encountered by an indi- vidual and/or protective detail? In 2002, in an effort to train the team to respond to real world threats, not just some hypothetical attack, I began researching targeted attacks from around the world, beginning with January 1950. In April of 2010, I published the first result of this research, targeted Violence: A statistical and tactical Analysis of Assassinations, Contract Killings, and Kidnappings (CRC Press, 2010). This was a compilation and analysis of 900 targeted attacks on individuals, many of whom had protective teams. The attack information was broken down to individual elements to allow for ease of understand- ing. Since then, I have continued to monitor attacks occurring around the world. While many attacks have fallen into the statistical “norm” that I discovered during my early research, there also have been a fair amount ix
Description: