Frequently Asked Questions

ENQUIRE

Frequently Asked Questions

The role of Close Protection encompasses ALL aspects of protective measures that work in concert: physical and technical combined with constant thorough planning and sound operational procedures to negate/ minimise risk or the threat of risk to kill/ injure/ or harm another in any way.
Close Protection Operational Performance is: The performance of a business, organisation or operative against prescribed standards, where the objectives of speed, flexibility, quality, costs and dependability are fulfilled or accomplished against a promise, contract or obligation according to its terms.
Threat is:
  1. A declaration of the intention to inflict harm, pain, or misery
  2. An indication of imminent harm, danger, or pain
  3. A person or thing that is regarded as dangerous or likely to inflict pain or misery
Risk is: The level of exposure to the threat
Vulnerability is: The likelihood of success of a specific threat on a target
A Threat Assessment is: - Defining the overall risk and consequences of threat(s) materialising
  • History of attacks
  • History of threats, (and current threats); verbal, written, perceived
  • Country/ location
    • History & probability of natural disasters; earthquakes, floods, wild fires, tornados, landslides, volcanic eruptions
    • History of war & armed aggression/ civil instability/ local crime
  • Principal profile/ current travel methods and locations visited
  • Socio-economic, royal & political, (or religious), status
  • Social, business & leisure interests
 
A Risk Assessment is: - Determining the probability of threat occurrence despite current safeguards
  • Determining the capability and ability of known threats
  • Assessing existing security measures; manpower, systems & procedure in mitigating those threats
    • Conducting penetration tests on estate boundaries, residences, offices and yachts
A Vulnerability Assessment is: - Determining the likelihood of success of a specific threat on a target
  • Assessing current proactive and reactive standard operating procedures
  • Assessing the effectiveness of current security equipment and systems, their design, methods and procedures against specific attacks
  • Personnel training
Surveillance is: The systematic observation by covert or overt means of a person or location by either visual, photographic or technical means.
Counter Surveillance is: The conduct of specific actions by a third-party individual or team to confirm and/ or identify the presence of surveillance on:
  • Yourself
  • Designated Individuals
  • Buildings
  • Areas
  • Assets
Anti-Surveillance is: A system of drills used by an individual or Close Protection Team to detect, confirm and/ or evade surveillance.
Intrusive Surveillance is defined as: “Covert surveillance in relation to anything taking place on residential premises or a private vehicle. It may be carried out either by a person or device inside residential premises or a private vehicle or by a device placed outside.”
Directed Surveillance is defined as: “Covert surveillance of individuals (foot or mobile) during a specific but non-intrusive investigation’ where ‘Surveillance’ is defined as “including any monitoring, observing and listening to persons, their movements, conversations or other activities or communications where it is carried out in such a way to ensure that those targeted are unaware that it is taking place. It also includes any recording of such activity and surveillance by or with the assistance of a device”.
Protective surveillance is: A specialist covert process in which a third-party individual, building, area or asset are protected through security methods that are covert, strategic and perceptive.

Case Studies