Bodyguards: How to Protect Others - Part 2.1 - Threat Analysis
5/5
()
About this ebook
This book is designed to help bodyguards, security personnel and others how to properly complete threat analysis. It covers several different kinds of threats. It teaches threat profiling, threat analysis, understanding threat, threat modelling, target selection, advantages of the attackers and The Herrhausen Factor.
Michael J. Franklin
Michael J. Franklin is a graduate of the Canadian Forces School of Intelligence and Security (Protective Services), The Royal Military Police Close Protection Wing and The German National Police (BKA-Personenschutz) Close Protection School. Over the past 25 years he has taught Close Protection Skills, Tactics and Planning, International Law, Security Related Technologies, Vulnerability Studies, Threat Assessments, Weapons, Explosives, IED Searching Techniques, Offensive, Defensive and Tactical Close Protection Driving Skills. He has been personally involved in protecting the world‘s elite for over 35 years
Read more from Michael J. Franklin
Close Protection: The Art of Protecting Others Workbook Rating: 0 out of 5 stars0 ratingsBodyguards: How to Protect Others - Part 4.2 - Basic Tactics Rating: 5 out of 5 stars5/5Bodyguards: How to Protect Others - Basic Course Rating: 5 out of 5 stars5/5Bodyguards: How to Protect Others - Part 2.3 - Manners, Protocol, Etiquette and Communication Rating: 5 out of 5 stars5/5Bodyguards: How to Protect Others - Security Planning Rating: 5 out of 5 stars5/5Bodyguards: How to Protect Others - A.T.I.S. – Individual Security Concept for Event Planning Rating: 5 out of 5 stars5/5Bodyguards: How to Protect Others – Part 4.1 Bodyguard’s Defensive Weapons and Equipment Rating: 5 out of 5 stars5/5Bodyguards - How to Protect Others - Part 2.2 - Security Advance Planning (SAP) Rating: 5 out of 5 stars5/5
Related to Bodyguards
Related ebooks
Bodyguards: How to Protect Others – Part 4.1 Bodyguard’s Defensive Weapons and Equipment Rating: 5 out of 5 stars5/5Bodyguards: How to Protect Others - A.T.I.S. – Individual Security Concept for Event Planning Rating: 5 out of 5 stars5/5Hostage Rescue Manual: Tactics of the Counter-Terrorist Professionals, Revised Edition Rating: 5 out of 5 stars5/5Facing Violence: Preparing for the Unexpected Rating: 4 out of 5 stars4/5Advanced Preparation: The Secret Skills of an Ex-IDF Special Forces Operator That Will Keep You Safe - Advanced Guide Rating: 0 out of 5 stars0 ratingsTough Mark: Domestic Terrorism On Our Streets Rating: 0 out of 5 stars0 ratingsThe Green Beret Survival Guide: Advice on Situational Awareness, Personal Safety, Recognizing Threats, and Avoiding Terror and Crime Rating: 0 out of 5 stars0 ratingsPrepared: The 8 Secret Skills of an Ex-IDF Special Forces Operator That Will Keep You Safe - Basic Guide Rating: 5 out of 5 stars5/5Be a Hero: The Essential Survival Guide to Active-Shooter Events Rating: 5 out of 5 stars5/5Business Espionage: Risks, Threats, and Countermeasures Rating: 0 out of 5 stars0 ratingsShots Fired: Surviving an Active Shooter/Assailant Rating: 0 out of 5 stars0 ratingsTerrorism and Homeland Security: An Introduction with Applications Rating: 2 out of 5 stars2/5Unarmed Combat: Hand-to-Hand Fighting Skills from the World's Most Elite Military Units Rating: 4 out of 5 stars4/5Bodyguards - How to Protect Others - Part 2.2 - Security Advance Planning (SAP) Rating: 5 out of 5 stars5/5Security Awareness in Close Protection Rating: 0 out of 5 stars0 ratingsThe Protected Rating: 0 out of 5 stars0 ratingsIntroduction to Executive Protection Rating: 0 out of 5 stars0 ratingsThe Protector's Handbook: A Comprehensive Guide to Close Protection Rating: 0 out of 5 stars0 ratingsThe Art and Science of Security: Practical Security Applications for Team Leaders and Managers Rating: 5 out of 5 stars5/5Executive's Guide to Personal Security Rating: 5 out of 5 stars5/5How to Become a Mercenary: The Ultimate Guide to the Weapons, Training, and Tactics of the Modern Warrior-for-Hire Rating: 0 out of 5 stars0 ratingsThe Bodyguard Blueprint: A Field Guide to Executive Protection Business Success Rating: 0 out of 5 stars0 ratingsA Primer in Private Security Rating: 0 out of 5 stars0 ratingsCrime Prevention & Security Program Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Success: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsThe SAS+ Security Handbook: The Ultimate Guide to Keeping Yourself Safe at Home & Abroad Rating: 4 out of 5 stars4/5The Corporate Security Professional's Handbook on Terrorism Rating: 0 out of 5 stars0 ratingsSecurity for Business Professionals: How to Plan, Implement, and Manage Your Company’s Security Program Rating: 0 out of 5 stars0 ratingsSurveillance and Threat Detection: Prevention versus Mitigation Rating: 5 out of 5 stars5/5Building a Travel Risk Management Program: Traveler Safety and Duty of Care for Any Organization Rating: 4 out of 5 stars4/5
Study Guides For You
Summary of The 48 Laws of Power by Robert Greene Rating: 4 out of 5 stars4/5Barron's American Sign Language: A Comprehensive Guide to ASL 1 and 2 with Online Video Practice Rating: 3 out of 5 stars3/5The 5 AM Club Summary: Business Book Summaries Rating: 4 out of 5 stars4/5Workbook on The Laws of Human Nature by Robert Greene | Discussions Made Easy Rating: 0 out of 5 stars0 ratingsSummary: The Subtle Art of Not Giving a F*ck by Mark Manson Rating: 4 out of 5 stars4/5Summary of 12 Rules For Life: An Antidote to Chaos by Jordan B. Peterson Rating: 4 out of 5 stars4/5Summary of Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones by James Clear Rating: 5 out of 5 stars5/5To Kill a Mockingbird (Harperperennial Modern Classics) by Harper Lee | Conversation Starters Rating: 3 out of 5 stars3/5Workbook & Summary of Becoming Supernatural How Common People Are Doing the Uncommon by Joe Dispenza: Workbooks Rating: 0 out of 5 stars0 ratingsSummary of How to Know a Person By David Brooks: The Art of Seeing Others Deeply and Being Deeply Seen Rating: 3 out of 5 stars3/5Summary of Poverty, by America By Matthew Desmond Rating: 4 out of 5 stars4/5Summary of Discipline Is Destiny by Ryan Holiday: The Power of Self-Control (The Stoic Virtues Series) Rating: 5 out of 5 stars5/5Gone Girl: A Novel by Gillian Flynn | Conversation Starters Rating: 4 out of 5 stars4/5Much Ado About Nothing (No Fear Shakespeare) Rating: 0 out of 5 stars0 ratingsFifty Shades Trilogy by E.L. James (Book Analysis): Detailed Summary, Analysis and Reading Guide Rating: 5 out of 5 stars5/5Summary of Eat to Beat Disease by Dr. William Li Rating: 5 out of 5 stars5/5Workbook on How to Do the Work by Nicole LePera: Summary Study Guide Rating: 2 out of 5 stars2/5Summary of Young Forever by Mark Hyman M.D.: The Secrets to Living Your Longest, Healthiest Life Rating: 0 out of 5 stars0 ratingsSummary of You Are a Badass by Jen Sincero Rating: 5 out of 5 stars5/5A Court of Thorns and Roses: A Novel by Sarah J. Maas | Conversation Starters Rating: 5 out of 5 stars5/5Summary of Oath and Honor by Liz Cheney: A Memoir and a Warning Rating: 5 out of 5 stars5/5
Reviews for Bodyguards
1 rating0 reviews
Book preview
Bodyguards - Michael J. Franklin
Bodyguards – How to Protect Others
Part 2.1
The Threat Analysis
By Michael J. Franklin
ISBN: 978-3-941101-07-4
Published by Michael J. Franklin at Smashwords
© 2010 Michael J. Franklin
Cover and Interior Design by Irmgard Walter
Michael J. Franklin
BODYGUARDS
How to protect others
The Complete Guide
International Security Protocol in the 21st century
The World of Close Personal Protection
Part One The Players and their Roles
Part Two The Threat Analysis; Advance Security; Manners, Protocol and Etiquette
Part Three Close Protection Psychology; Law, Legal Issues and Emergency Medicine
Part Four Weapons and Equipment; Embus and Debus Points; Vehicle Security Techniques; Route Selection and Planning
Part Five Improvised Explosive Devises; Walking, Driving and Emergency Drills
Part Six Security-Related Technologies; Video, Alarm and Fire Fighting Systems; Physical Security
Contents
The following topics are covered in detail in this book:
Chapter One
Targeted attacks
Advantages of the attackers
Target selection
Target profiling
Understanding the threat
Threat profiling
Threat modelling
Obtaining information
Chapter Two
The Herrhausen Factor
What’s the message
The Alfred Herrhausen Attack
Herrhausen’s situation
Herrhausen’s last day
How the attack took place
Threat assessments
Security counter-measures
The Attackers
The inevitable criticism
Chapter Three
Scenario analysis
Security counter-measures
Analysis of different attacks
Attacks that have taken place in houses and apartments
Attacks that have taken place when people have left buildings
Attacks using IEDs on parked cars
Attacks on vehicles
Attacks in government building – restricted entry
Attacks at events – un-restricted entry
Attacks in open areas
Attacks during walks or in parks
Attacks using letter or parcel bombs
Chapter One – Threats and Dangers
Targeted Attacks
In Close Protection the terms threat
and danger
describe the possibility of intended or targeted attacks from assassins, terrorists, kidnappers and people running amok. If you add organised crime to this list, it’s the threat coming from anyone who wants to kill, hurt, kidnap, extort, embarrass or terrorise the Boss.
Most of the contents of this chapter will pertain to terrorism and organised crime. Therefore it is important to put definitions to these violent acts and to the people who commit them. Many people have misconceptions about terrorists and organised criminals that should be cleared up.
Most terrorists and organised criminals are not poor, uneducated or oppressed, nor do they have long hair and wear military uniforms. Many of these people come from middle or upper class families. They might be children of doctors, lawyers, big businessmen and engineers. On the most part they are younger, however, the terrorists who survived the 60s, 70s and 80s, if they are still active, are getting older. Theirs is a very stressful life and even the best-known master terrorists, such as CARLOS have been caught and imprisoned.
Adu Nadal, the ex-leader of the PLO-PFLP has died. Many of the old gangs are still with us and create havoc from time to time with their local systems, such as, PIRA (Provisional Irish Republican Army - Provo’s), IRA (Irish Republican Army), and PLO - Hamas. Many terror organisations worldwide continue their activities, their numbers are growing and Al Qaeda under the leadership of Osama bin Laden seem to be elusive and unstoppable. They have brought violence to an incomprehensible level by involving an enormous number of innocent people. However, their ideals and beliefs, political persuasion, financial motivation or religious ideology don’t matter.
A bodyguard’s job is to keep the Boss clear of any threat. Terrorists may be motivated by political or religious reasons or be motivated by a cause, such as the Green Peace „Save the Whales" campaign. However, as a general rule, different motivations tend to get mixed together. Criminal terrorists are motivated strictly by financial interests, but they often operate under the disguise of political or religious causes. Many terrorists finance their own activities through criminal activities such as robbing financial institutions. Politically motivated terrorists who may start out with pure objectives are apt to turn to violence or a combination of violence, power and making money.
Terrorists may have been good law-abiding citizens once who have gone wrong for all the right reasons. They may be members of an environment organisation or a number of other groups with a cause. Don’t misunderstand; terrorists with a cause are as serious a threat as religious terrorists. International terrorists have