INTRODUCTION TO EXECUTIVE PROTECTION SECOND EDITION 43455.indb 1 12/13/07 12:29:21 PM 43455.indb 2 12/13/07 12:29:21 PM INTRODUCTION TO EXECUTIVE PROTECTION SECOND EDITION DALE L. JUNE Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business 43455.indb 3 12/13/07 12:29:22 PM CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487‑2742 © 2008 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid‑free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number‑13: 978‑1‑4200‑4345‑7 (Hardcover) This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the conse‑ quences of their use. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www. copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978‑750‑8400. CCC is a not‑for‑profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging‑in‑Publication Data June, Dale L. Introduction to executive protection / Dale L. June. ‑‑ 2nd ed. p. cm. Includes bibliographical references and index. ISBN 978‑1‑4200‑4345‑7 (alk. paper) 1. Executives‑‑Protection. 2. Executives‑‑Crimes against. 3. Kidnapping‑‑Prevention. 4. Corporations‑‑Security measures. 5. Private security services. I. Title. HV8290.J86 2007 658.4’73‑‑dc22 2007034340 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com 43455.indb 4 12/13/07 12:29:23 PM Dedication To Kelly, Casey, Tori, and Katy For a lifetime of continuous support, love, and inspiration To Muslima and Mohammed For unconditional love, unremitting encouragement, and strength To Jake, Alyessa, Rukhsar, and Sakina A new generation and reasons for making the world safer And to all those “brothers and sisters” of the personal protection fraternity who would stand in the line of fire to safeguard another. IN MEMORIAM President Gerald R. Ford, (July 14, 1913—December 26, 2006) Whom I served with great respect. A man who believed in “doing the right thing” for all the right reasons. He was exactly the right person, for the right job, at the right time. 43455.indb 5 12/13/07 12:29:24 PM 43455.indb 6 12/13/07 12:29:24 PM Contents Preface.....................................................................................................................xix Acknowledgments....................................................................................................xxi Foreword...............................................................................................................xxiii About.the.Author..................................................................................................xxvii The.Shield.and.the.Rose........................................................................................xxix Chapter 1 Introduction:.An.Evolving.Necessity.in.a.Changing.World..................1 Objectives.of.This.Book...........................................................................................10 Review.Questions.....................................................................................................14 Chapter 2 Human.Need.for.Security:.Protection,.Defense,.Safety. Measures,.and.Precautions..................................................................15 Historical.Background..............................................................................................15 Violence.in.Society...................................................................................................16 Fear.of.Terrorism.and.Crime....................................................................................16 Fear—No.Greater.Weapon.......................................................................................17 Psychology.of.Fear.and.Danger................................................................................19 Importance.of.Understanding.Fear...........................................................................20 Acceptance.of.fear....................................................................................................22 Understanding.the.Need.for.Security—Psychology.and.Sociology.........................23 Hierarchy.of.Needs...................................................................................................23 Summary...................................................................................................................24 Review.Questions.....................................................................................................25 Notes.........................................................................................................................25 Chapter 3 Psychological.Perspectives.on.Security.Issues....................................27 Motivations...............................................................................................................27 Psychological.Correlation.between.Security.Seekers.and.Security.Providers.........28 Psychological.Aspects.of.the.Protector....................................................................30 Motivations...............................................................................................................31 Creativity..................................................................................................................33 Creative.Personality..................................................................................................34 Challenges.and.Competition.....................................................................................35 Problem.Solving—New.Projects..............................................................................35 Other.Motivators.......................................................................................................35 Unseen.Qualities.......................................................................................................36 Protectee’s.Motivation..............................................................................................36 Psychological.Aspects.of.the.Protectee....................................................................37 Motives.of.the.Threatening.Person...........................................................................38 vii 43455.indb 7 12/13/07 12:29:25 PM viii Contents Psychological.Motivators.for.Terrorism...................................................................39 Summary...................................................................................................................40 Review.Questions.....................................................................................................40 Notes.........................................................................................................................41 Chapter 4 Assassination!......................................................................................43 History......................................................................................................................44 Political.Assassination..............................................................................................45 Assassination.of.the.Archduke.of.Austria................................................................47 American.Assassinations.of.the.1960s—America’s.Decade.of.Violence................49 Attacks.on.the.Office.of.the.President—1970s.to.1980s..........................................52 Historical.Presidential.Attacks.................................................................................55 Lessons.Learned.......................................................................................................62 Religious.Assassinations...........................................................................................64 Psychological.Profile.of.the.Assassin.......................................................................68 Professional.Assassin................................................................................................71 Profile.of.a.Professional.Assassin.............................................................................71 Assassination.Myths.and.ECSP.Findings.................................................................73 Summary...................................................................................................................74 Review.Questions.....................................................................................................74 Note. ........................................................................................................................74 Chapter 5 Close.Personal.Protection:.What.It.Is,.What.It.Is.Not........................77 What.is.Close.Personal.Protection?..........................................................................77 Historical.Roots—Personal.Protection–Private.Security.........................................78 Chivalry.of.Knights.and.Protective.Agents..............................................................79 Historical.Antecedents..............................................................................................79 Pinkertons.................................................................................................................80 Executive,.VIP,.and.Celebrity.Protection.................................................................81 Bodyguards.versus.Executive.Protection..................................................................82 Bodyguards....................................................................................................82 Executive.or.Close.Personal.Protection.........................................................85 Origins.of.Executive.Protection....................................................................86 Heroes?.Or.Just.Another.Day.at.Work?....................................................................88 Taking.a.Bullet.….....................................................................................................88 Why.Protection?........................................................................................................89 Stalking—Erotomania..............................................................................................90 Principles.of.Protection............................................................................................91 Prepare.for.Any.Eventuality.....................................................................................94 Deterrence.................................................................................................................94 How.Much.Protection.Is.Adequate,.and.When.Does.Adequate.Become. Excessive?......................................................................................................94 Hardening.the.Target................................................................................................95 Who.Are.the.Principals.or.Protectees?.....................................................................97 43455.indb 8 12/13/07 12:29:26 PM Contents ix Summary...................................................................................................................98 Review.Questions.....................................................................................................98 Notes.........................................................................................................................99 Chapter 6 Preparing.for.the.Big.Dance:.The.Advance......................................101 The.Advance...........................................................................................................101 Anticipate.…................................................................................................102 Plan.….........................................................................................................102 Prepare.…....................................................................................................102 What.Is.an.Advance?..............................................................................................103 What.Is.Common.Sense?—Using.Your.Brain............................................104 What.Is.Imagination?...................................................................................104 Anticipate,.Plan,.and.Prepare.................................................................................105 Anticipation.................................................................................................105 Planning.......................................................................................................106 Preparation...................................................................................................106 Conducting.a.Protective.Advance...........................................................................106 Situation.Reports.....................................................................................................110 Diagrams,.Maps,.Photos—Their.Role.in.the.Security.Process..............................110 Role.of.Protective.Intelligence.in.an.Advance.......................................................111 Role.of.Technical.Surveillance.Countermeasures.in.an.Advance..........................111 Psychological.Perspectives.of.an.Advance.............................................................111 Writing.an.Advance.Security.Survey.Report.........................................................112 Purpose........................................................................................................112 Format..........................................................................................................113 Other.Duties.of.an.Advance.Man...........................................................................114 What.If.It.Is.Not.Possible.to.Have.an.Advance.Man?............................................114 Terrorist.Advance...................................................................................................115 Attacker’s.Viewpoint...................................................................................115 Mirror.Image...............................................................................................116 Mirror.Effect................................................................................................116 First.Stage—Research,.Reconnaissance,.Surveillance/Countersurveillance.........119 Reconnaissance.and.Research.....................................................................119 Other.Things.to.Know.................................................................................120 Surveillance.and.Countersurveillance.........................................................120 Second.Stage—Planning........................................................................................122 Third.Stage—Execution.........................................................................................122 Important.Recommendations......................................................................122 After.the.Operation.................................................................................................123 Summary.................................................................................................................123 Review.Questions...................................................................................................124 Notes.......................................................................................................................124 43455.indb 9 12/13/07 12:29:27 PM
Description: