The 25 Types of Executive Protection Agents – AKA Bodyguards

Fun Edition – A brutally honest field guide to many of the personalities you will find on any given  detail.

Let’s start with a disclaimer: This is all in good fun and mostly a light-hearted educational effort (…mostly). If you see yourself in one of these, take it as a chance to laugh, learn, and maybe reflect. Don’t worry, we’ve all been at least one of these at some point. Growth starts with self-awareness… and hopefully,  fewer mirror selfies.

1. The Tacticool Operator – Full MOLLE vest at a low-threat breakfast. Looks like he’s about to breach a compound to grab the client’s latte. Brings more gear than a Memorial Day sale at Palmetto State Armory.

2. The “I Know It All” – Claims he’s protected royalty, billionaires, and probably worked with a three letters agency. He/she won’t take ANY feedback but will gladly give you a TED Talk on unnecessary subjects you didn’t ask to know about.

3. The Shadow Ninja – Ghosts the second things get real, and s***t hits the fan. No one’s seen him since call time, but he swears he’s maintaining overwatch. Last seen ‘monitoring from a distance’, usually from the hotel buffet.

4. The Bully – Confuses intimidation with work competence. Yells at hotel staff. Threatens the valet. Bullies his teammates.

5. The Instructor – Treats every shift like a live seminar, whether you asked or not. Will gladly debrief you on your shoelace technique and critique your placement of your lapel pin.

6. The Gearhead – Shows up looking like a tactical vending machine. 19 gadgets, 4 flashlights with zero clue how to use anything. But hey, his gear costs more than your monthly rent. (Literally rattles as he walks down the quiet venue hallway with the principal.)

7. The Look-At-Me Suit – Carries himself like a runway model, impeccably tailored, hair shellacked to perfection, gleaming cufflinks, and a tie pin that’s seen more action than he has. Looks sharp, moves slow, and folds faster than a lawn chair at the first sign of trouble.

8. The Ghost of Contracts Past – Hasn’t worked a detail since flip phones were standard issue but claims to have protected everyone from the Pope to Elon Musk. No current gigs, just an endless loop of war stories, name-drops, and “you had to be there” moments.

9. The Quiet Pro – Calm, prepared, and drama-free. Doesn’t post, doesn’t brag, just shows up early, stays squared away, and handles business. He rarely speaks, but somehow always knows what’s coming. Never says a word, but you know he’s the one keeping things together. (Quite often has more experience than the whole team put together but sees no reason to bring it up or discuss it.)

10. The Client’s New Best Friend – More commonly known as the “BuddyGuard”. Desperate to be noticed by the client. Overshares personal stories. Laughs way too hard at the client’s jokes. Always standing just a little too close. Probably gets replaced after one trip. Always very quick to tell everyone how he and the principal have a “close knit relationship.”

11. The Rooftop Ninja Paranoid – Certain the next threat is coming from a rooftop sniper, a flower pot, or that sweet old lady with the purse. Scans every vent and pigeon like it’s housing a tactical assault team. Lives in a permanent state of Code Red, with zero chill. Pure cortisol, no calm whatsoever.

12. The LinkedIn Warrior – Online, he’s a tactical genius with elite leadership skills. On the ground? He panics when the elevator skips a floor. His resume’s impressive…too bad reality didn’t get the memo.

13. The Angry One – Everything was better “back in the day.” Finds fault with everything and everyone, especially if they’re breathing. Hates the client, the team, the hotel coffee, and probably the very concept of happiness and life itself.

14. The Philosopher – Talks more about ego death and quantum consciousness than safety zones and exits. Probably carries a worn-out copy of The Art of War and refers to threats as “energetic imbalances”.

15. The Codebook Guy – He is the human rulebook. Carries a laminated handbook like it’s a sacred text and quotes protocol like scripture. Has a meltdown if someone takes initiative without a written directive and a three-signature chain of command. Remember the yellow footprints in boot camp? This is the guy…

16. The Influencer – Formerly known as the Selfie Soldier 2.0. Every detail is a photo shoot and bragging opportunity. Can’t walk past a mirror without a tactical selfie. Hotel bathroom? Perfect for a photoshoot. Motorcade reflection? Even better. More focused on building their following than protecting the principal.

17. The Drama Queen – Complains about the hours, the post, the hotel pillow, and the client’s attitude, usually before their shift even starts, while they’re eating breakfast in a 3 Star Michelin restaurant. Thrives on tension and somehow turns every shift into a soap opera. If there’s peace on the team, give it 10 minutes… they’ll fix that.

18. The Certification Addict – Alphabet soup after their name and has more certificates than field hours. Proud graduate of every tactical, medical, and underwater knife-fighting course on the planet… but still can’t plan a basic advance or read a site map without getting lost.

19. The Gear Floater – Shows up empty-handed like it’s his first day…every day. No earpiece, no radio, no flashlight… somehow, no tie either. Treats the team like a mobile supply depot and still acts like he’s doing you a favor.

20. The Diplomat – He’s “Switzerland”, neutral, polite, and too nice to say no. Bends over backward to avoid conflict, says yes to everything, and somehow ends up overworked, overlooked, and underappreciated.

21. The Overcompensator – Short guy, big ego, bigger sunglasses. Talks like a tier-one operator, moves like a traffic cone. Folds the moment things get loud and real.

22. The Chronically Late Guy – Always “five minutes out”, even when the shift started an hour ago. Blames traffic, GPS, the rotation of the Earth, anything but himself. Shows up mid-shift with a coffee in hand and zero shame.

23. The Gym Bro – Lifts for three hours before call time, then passes out in the follow car. Protein shaker rattling like a maraca, sleeves one size too small hanging on for dear life, and zero clue where the principal is.

24. The One Assignment Wonder – Did one detail six years ago and hasn’t stopped talking about it since. Drops acronyms like candy, name drops vaguely. You’d think he ran a presidential motorcade, but it turns out it was a mall opening.

25. The One with “No Filter” – Says the quiet part out loud… and plenty no one ever wanted to hear. Awkward jokes, offhand comments, and zero reading of the room. Has made at least one client, staff member, and hotel manager deeply uncomfortable…before lunch.

BONUS TYPE: The Self-Promoter – Wears branded merch on every detail. Business cards in the glove box. Turns casual conversation into a sales pitch.

At the end of the day, this list is a humorous take on real-world behaviors we all encounter in the field. Recognizing these behaviors, whether in ourselves or in others, is not about assigning blame, but about promoting self-awareness and professional growth. Executive protection is a high-stakes environment where attitude, adaptability, and accountability matter as much as any other kind of skill. The goal isn’t perfection, it’s progress. Let’s all of us aim to be the type of professional others want on their team. And remember… A little humor along the way doesn’t hurt.

Did we miss a type? Share your experiences in the comments, and let’s be honest, we’ve all played one of these roles at some point in our careers.

#ExecutiveProtection #CloseProtection #SecurityProfessionals #BodyguardLife #ProtectiveDetails #EPCommunity #SecurityTraining #SecurityIndustryHumor #FieldNotesFromTheDetail #RealEPStories

When bodyguards become the risk

This is another great example of when the bodyguards refuse to learn and thus, become the risk. It’s one thing for civilians to overlook digital footprints. But when trained EP agents repeatedly ignore known vulnerabilities, that’s not merely a mistake, it’s a significant security failure. And unfortunately this isn’t new.

In 2018, Strava’s Global Heatmap exposed covert military bases and routine patrol routes. That was seven years ago. We’ve known about this. In 2024, investigations revealed dozens of EP agents from U.S., French, and Russian teams publicly sharing workout data, which included 26 U.S. agents (Biden’s EP team), 12 French GSPR members (Macron’s team) and 6 Russian FSO officers (Putin’s team).

And now, in 2025, Swedish bodyguards for the Prime Minister and Royal Family posted over 1,400 workouts to Strava, at least 35 of them revealed sensitive locations, including the PM’s residence, diplomatic sites, and vacation spots. Some of that data is still live and public today…

Let’s be clear: This isn’t a tech glitch! This isn’t bad luck! This is a failure to learn, adapt, and take responsibility. If your security team won’t fix the risks they’re causing, they’re not protecting anyone, they’re compromising everything.

In our profession, “I didn’t know” is not a valid excuse. When you normalize digital negligence, you normalize operational failure. It’s been seven years since the first public warning. If your team still doesn’t have digital discipline, your client is already exposed, and your operation is already compromised.

Read more here https://www.politico.eu/article/swedish-bodyguards-workout-data-exposes-royal-familys-private-vacations/

#ExecutiveProtection #Strava #DigitalSecurityRisks #SecurityFailure #StravaLeaks #ProtectiveIntelligence #OperationalSecurity #DataExposure

CEOs Under Attack – The Growing Risks for Corporate Leaders

This article was first published in Chief Executive Officer


The recent assassination of UnitedHealthcare CEO Brian Thompson has cast a spotlight on the vulnerabilities faced by many corporate leaders and is a great example of how C-Suite executive’s safety can affect not only their personal wellbeing, but also can drastically affect a company’s reputation and stock. According to News Nation, UnitedHealth Group shares are down more than 14% since Thompson was shot and the company is counting its losses in billions.

While many corporations see security as an unnecessary financial loss and many won’t consider it in their budget, history has shown us that failing to protect their executives can cause an enormous financial loss. As we have seen, there have been many reported incidents surrounding violence towards C-suite executives. Some of the most well-known cases, the kidnappings of the Toronto crypto company CEO who got kidnapped last November and was held for $1M ransom before being released, the murder of the tech executive Bob Lee, founder of Cash App in San Francisco, in 2023, and the death of another tech executive Vivek Taneja, who was assaulted in downtown D.C. on February of the same year and succumbed to his injuries a day later. These incidents, along with many others, bring again to light potential dangers that corporate leaders face today.

Photo by Tima Miroshnichenko on Pexels.com

Reality Check

While the general public assumes that all high-profile individuals, including celebrities, have security, the reality is that many C-suite executives operate day-to-day without any security presence. Whether they are traveling for business, attending meetings and conferences, or simply going about their daily routines, these individuals often find themselves exposed to various threats without the support of a dedicated security team.

The reasons for this vary. In some cases, the cost of executive protection is not prioritized within the company’s budget. In others, reductions in force (RIF) have affected the security team. Additionally, even when security is provided, many executives resist it, preferring to avoid the perceived inconvenience of having protection around them. One of the biggest challenges when assigning security to specific individuals is their non-compliance, as they believe they will lose their privacy and be forced to change how they live their lives.

Significant Incidents Involving CEOs:

Brian Thompson was the latest victim, but not the only one by far:

  • Pava LaPere, a 26-year-old tech entrepreneur, was found dead on the roof of her building, half-naked, strangled, and brutally beaten.
  • 51-year-old Forrest Hayes, the former senior director of Apple’s worldwide operations, was killed by a high-priced prostitute who injected him with a lethal dose of heroin and then left him to die on his luxury yacht.
  • In 2019, Tushar Atre a tech executive and founder of a Santa Cruz-based web design company, was kidnapped from his home on October 1, 2019. He was later found dead in his girlfriend’s BMW SUV. Several suspects, including former employees, were arrested in connection with his death.
  • In 2022, Artemis Seaford, a high-level executive at Meta and dual U.S. – Greek national, was found to be surveilled by surveillance-for-hire software for around one year.
  • In 2015, Tadas Kasputis, one of the founders of CoinStruction and the ExMarkets crypto-exchange was kidnapped in his hometown Kaunas city in Lithuania by criminals who wanted to gain access to his crypto wallet.
  • In 1998, Bill Gates, was hit in the face with a cream pie as he was about to enter a building for a meeting in Brussels.
  • In 2018, Jeff Bezos had his mobile phone “hacked” after receiving a WhatsApp message.

As we can see from multiple cases, threats towards these individuals can come from any direction and at any given opportunity. Those of wealth or stature in society find themselves becoming a target or being “condemned” by groups who feel that they somehow deserve more and that their goal is best obtained through violence of some sort.

We all saw how executives and personnel from pharmaceutical companies were targeted during the Covid lockdowns and how specific minorities (Asian) have been singled out for harassment recently due to stories surrounding the supposed origins of Covid as well as the tedious political arena of U.S/Chinese relations. Russian businessmen/women have become victims of various crimes against themselves, their families, assets, and companies.

The Need to Protect the Brand

One thing that often escapes the attention of many corporate boards is that CEOs and other high-level C-suite executives are not just leaders of their organizations, they are the face of the company, the human embodiment of the Brand. Protecting these individuals extends far beyond safeguarding their lives; it is also about safeguarding the brand’s reputation, market value, and future stability.

The visibility of executives today has grown exponentially. Shareholders, clients, and the media closely associate a company’s identity and trustworthiness with its leadership team. When a CEO or prominent executive is harmed, whether through assassination, kidnapping or any other physical harm, the ripple effects can be catastrophic for their organizations. Such events can erode stakeholder confidence, shake public perception, and cause financial volatility.

For example, and as we mentioned earlier, following the tragic assassination of UnitedHealthcare CEO Brian Thompson, the company’s stock value reportedly dropped over 14%, resulting in billions of dollars in losses. This kind of damage is not limited to financial metrics alone; it can also impact on employee morale, customer trust, and the company’s ability to attract new business.

The brand-equity connection is further amplified in industries like technology, finance, crypto and healthcare, where executives are often seen as visionaries or cultural icons. Consider figures like Bob Lee, founder of Cash App, whose untimely death not only shocked the tech world, but raised concerns about safety for executives in high-risk urban environments. In these scenarios, the absence of robust protection not only puts lives at risk but also undermines the strength of the brand narrative and leadership continuity.

Corporate boards must understand that executive security is not just some numbers in your budget as an expense, but a proactive and strategic investment in their brand protection. While the first thing that comes to mind is the importance of preserving human lives, organizations have to also realize that any harm done to their executives and employees will have a tremendous impact on their business.

The loss of the leaders in their business (the brains behind their products), the loss of their intellectual property, and the disturbance of their daily operations will cause the employees, customers and investors to lose faith in them. Failing to protect their own executives leaves companies vulnerable, not just to physical threats but to reputational damage that can take years to repair.

Photo by Pavel Danilyuk on Pexels.com

The Giant With Feet made of Clay

One thing that has become increasingly apparent in light of these recent incidents is how surprisingly easy it can be for individuals, often with limited resources, minimal planning, and very little experience, to approach, harm or embarrass high-profile public figures, including CEOs and other C-suite executives. These events expose a concerning vulnerability: corporate leaders, who represent power and authority can still be physically or reputationally damaged with alarming ease.

The very perception of strength that many companies project, be it through financial dominance, market influence, or industry leadership, can quickly crumble when their most visible representatives are attacked or harmed. It reveals the “giant with feet made of clay”: an entity that appears powerful and unstoppable on the surface but, in reality, cannot adequately support or protect its executives, leaving them exposed to danger.

This illusion of invincibility creates a dangerous dichotomy. While corporations may excel at presenting their resilience in business operations, their failure to ensure the security of their leadership undermines their credibility. Each time a CEO or executive is harmed (whether through kidnapping, physical assault, or character assassination) it sends a message to stakeholders, employees, and even competitors that the “giant” is vulnerable. The company’s façade of stability cracks, and the repercussions can be severe:

  • Financial Fallout: Attacks on executives often trigger stock price drops, erode investor confidence, and cause millions, if not billions, in losses.
  • Reputational Damage: If a company cannot protect its leadership, what message does that send to clients, employees, and the public?
  • Operational Disruption: The absence or incapacitation of key executives can destabilize decision-making and hinder long-term strategic goals.

High-profile incidents, like the assassination of UnitedHealthcare CEO Brian Thompson or the kidnapping of crypto executives such as WonderFi’s Dean Skurka, are not anomalies, they are warning signs. They demonstrate that harm can come, not just from organized, well-funded adversaries or criminal organizations, but also from individuals acting alone with limited means. These cases emphasize a critical truth: public figures, especially those in leadership roles, are increasingly accessible targets.

Companies must reassess their priorities and abandon the illusion that their leaders are untouchable simply because they are perceived as powerful. Executive protection for your C-Suite executives is not a luxury or a budget allowance; it is a necessity. A company that fails to shield its most visible assets, its leadership, risks becoming a symbol of fragility rather than strength.

What Comes Tomorrow?

For those closely following the latest incident, the aftermath of UnitedHealthcare CEO Brian Thompson’s assassination reveals troubling insights into public perception and growing hostility toward corporate leaders. Social media platforms quickly became a breeding ground for disturbing reactions. The majority of users were seen mocking or justifying Thompson’s death, with some going so far as to openly encourage similar attacks against other CEOs.

This online vitriol has already inspired real-world consequences. In a concerning copycat case, Briana Boston, a 42-year-old Florida woman, was charged after allegedly making a threatening call to BlueCross BlueShield over a rejected medical claim. While her actions did not escalate to violence, the threat underscores how quickly frustrations directed at executives can boil over into actionable hostility.

The assassination of Brian Thompson has set off a dangerous chain reaction. According to a recent warning issued by the New York Police Department (NYPD), US healthcare executives now face a heightened risk to their safety. Authorities uncovered an online “hitlist” circulating in the wake of Thompson’s death, featuring names, photos, and salaries of numerous other health insurance executives.

This list has amplified the sense of vulnerability. Executives who were once seen as inaccessible are now being publicly targeted. Compounding the issue, “wanted” posters featuring the faces and personal details of healthcare CEOs have appeared throughout Manhattan. These acts, whether meant as intimidation, protest, or a precursor to violence, signal a troubling escalation of hostility toward corporate leadership.

We are dealing with a disturbing growing phenomenon: digital outrage is no longer contained to online spaces. Social media platforms, already rife with grievances about systemic inequities, economic struggles, and corporate distrust, are now amplifying calls for real-world action against executives. Online forums and posts can radicalize individuals, especially those with personal frustrations or grievances, encouraging them to take matters into their own hands.

What comes tomorrow is not limited to healthcare. Brian Thompson’s assassination and its fallout serve as a stark warning to leaders across all industries. CEOs and C-suite executives are increasingly vulnerable, both as visible symbols of power and as targets of systemic frustrations.

Companies that fail to recognize and respond to this evolving threat landscape risk not only the lives of their leaders but also the stability of their operations and the trust of their stakeholders. The time for reactive measures has passed. A proactive, strategic approach to executive protection is now a necessity.

Don’t Be The “Giant With Feet of Clay’’

The evolving threat landscape necessitates a proactive approach to C-Suite executive protection. Companies should start thinking proactively, stop placing security as the first budget cut and must balance the need for security with the personal preferences of their executives, ensuring that protection measures are both effective and minimally intrusive.

  1. Prioritize Executive Security: They should start treating executive protection as an integral part of corporate strategy, not an afterthought.
  2. Adopt Proactive Risk Management: Conduct threat assessments, monitor vulnerabilities, and implement protective measures before incidents occur.
  3. Invest in Discreet and Effective Security Solutions: Develop security protocols that do not disrupt executives’ lives but still provide robust protection.

As we have seen, the message is clear: the world has changed, and so must corporate priorities. CEOs and other C-suite executives are not only the face of their organizations, but they are also vital assets whose safety directly impacts a company’s stability, reputation, and bottom line. Ignoring this reality exposes businesses to unnecessary risks that can have catastrophic consequences.

The “giant with feet made of clay” is no longer a metaphor; it is a warning. Companies must shed the illusion of invincibility and untouchability and take decisive, proactive action to protect their leadership. By prioritizing security, managing risks effectively, and implementing discreet security measures, businesses can protect not only their executives but also their brand, market value, operations, and future success.

In an era where a single incident can bring a giant to its knees, the choice is simple: adapt and fortify, or remain vulnerable and hope you are not next.

Bodyguards for Kids are Back!

Founded in 2023 Bodyguards for Kids unites the security industry to raise donations for St. Jude. This is a unique opportunity to connect with others in the field while supporting a meaningful cause. When you donate through our event page on St. Jude’s website, 100% of your contributions go directly to the children of St. Jude, ensuring they and their families receive life-saving care and access to cutting-edge research at no cost.


Over the past two events, we’ve raised $35,779 and hosted 30 international subject matter experts, all thanks to the our incredible sponsors, speakers, and attendees!

Through this event, our community has:
♦️ Learned from international subject matter experts.
♦️ Won scholarships, books, and other exciting raffle prizes.
♦️ Contributed donations that make a difference for these little heroes.

This year, we’re aiming even higher, and we need your help to make an even bigger impact!

Bodyguards for Kids 2025 will take place on March 29-30 (Saturday & Sunday), starting at 9:30 AM PST. The best part? The event is virtual, so you can join from anywhere!

How to Participate?
Simply make a donation on the Bodyguards for Kids 2025 event page on St. Jude’s website. Your donation serves as your ticket to the event and your entry into our raffle. For the direct donation link CLICK HERE.

The minimum donation to attend our virtual educational event is $50.
And while we welcome all participants and all donations of any amount you wish to give, we offer additional recognition to those individuals or corporations who donate at or above the minimums listed below.

Event Sponsorship
If you own a security company, or even as a private person, you can make a donation in your or your company’s name to our cause and be publicly listed as an individual or company donor with your name or company name and logo shown on our event page.
-The minimum donation for individuals to be listed as event donors is $250
-The minimum donation for companies to be listed as event donors is $500

How Else Can You Support Our Event
You can contribute by donating security-related books, training scholarships, or products. Don’t forget to share our event on your social media! Spread the word and help us make a difference for children in need. Whether you’re a security professional, a business owner, or simply someone who wants to make a difference, this is your chance to give back. Don’t Miss Out!

Join us today and help shape a brighter future for children in need. Together, we can make an incredible impact.

For more information visit Bodyguards for Kids 2025

Why ‘Experience’ Alone Isn’t Enough

The Need for Comprehensive Skills in Team Lead & Operations Manager Roles in Executive Protection

We see a lot of articles and posts that address the issues with executive protection agents or what skills are needed and how one should perform as a member of the team. But we rarely see an article that clearly addresses the issues concerning those in positions such as a team leader, security manager or operational director. While its always easy to blame the boots on the ground, it’s important to see and address the issues concerning those who are managing them.

Primarily, we see leadership positions held by people who have just left (Yes, that’s correct, just left) the employ of the ‘Three-letter’ agencies, military, or in some cases, people who have been heavily involved in the industry as EP agents for a number of years. As you can understand, there’s every reason why the first group are, quite often, the best choice for such roles. So today we will discuss the second group, and why the EP industry today, demands more from its leaders than just experience in the field.

We all know that positions like Team Leaders (TLs), Security Managers, or Operations Managers play an important role in ensuring the success of protection teams and client satisfaction, and why holding  one of these positions is not just about having a “higher role” (and payrate). However, a recurring issue in the industry is that many individuals ascend to these roles solely based on time served as EP agents, security guards, military service, law enforcement, or other security-related positions. While such backgrounds may seem at first to provide a strong foundation, they are insufficient on their own to support the multifaceted challenges a leadership position entails. Being a good soldier, having a great arrest record as a police officer or K9 handler, or having been an EP agent for ‘X’  amount of time, doesn’t automatically translate that you are a great fit for a leadership position.

Leadership roles have critical needs that go beyond their past experience, and they require additional skills and training in diverse domains. The consequences of neglecting professional growth in these areas can result in complications such as poor hiring decisions, misaligned role assignments, and inadequate team management. You will be amazed to realize how many times a failure wasn’t so much the fault of the lowly agent, but primarily due to the people in those leadership positions above them.

The Problem with Experience-Only Leadership

Experience in the military, law enforcement or other security related roles, often instill discipline, situational awareness, and tactical skills, qualities that are valuable in executive protection. However, these experiences (or the time you spent in the career) may not translate to effective leadership or operational management in a corporate or private security setting. Here’s why:

  • Inability to Define the Right Candidate for the Job

Many TLs, Security Managers, and Operations Managers lack the skills to create detailed job profiles for hiring. Instead of matching the best candidate to the job’s requirements, they often try to tailor the job to fit the skills of candidates they personally favor. They often default to selecting individuals with similar backgrounds as theirs or their generalized security experience. They overlook key factors such as soft skills, specialized training, and the ability to adapt to the diverse requirements that the client needs or wants. And even more detrimental, there are many cases of managers and detail leaders who find the resume or background of a highly qualified candidate to be intimidating and/or feel challenged by their respective experience and remove them from the list of qualified applicants. While the industry seems to always be complaining about the “quality” of agents, no one appears to be complaining about who did or didn’t hire them for the client in the first place! The best ‘fit’ for the task is not always on the task…

  • Challenges in Role Assignment

Even after hiring, many leaders fail to continue to assess their team members’ individual strengths and weaknesses. Each agent brings specific skills to the table, yet instead of assigning them to roles that align with their expertise, such as surveillance detection, client interactions, or working with children, they often assign tasks indiscriminately. This approach leads to inefficiency, mistakes and decreased team morale. While it can sometimes be challenging to identify the best role for an individual, leaders should be open to reassigning team members. If a placement doesn’t work, avoid forcing it and instead, reassign them to a different position. Leaders must be willing to experiment and refine roles until each team member is in a position that maximizes their value within the team. Try to maintain a long-term mindset. Role assignments are not static; they should evolve as agents grow in their careers and as team needs change.

It is also important to create a culture where team members feel comfortable discussing their strengths, preferences, and areas where they excel. This insight can be invaluable when deciding role assignments. In addition, when assigning roles, think beyond individual skills and consider how team members will interact. The right mix of personalities and expertise can significantly enhance overall team effectiveness…And the wrong combination can be its downfall.

  • Lack of Professional Empathy

Good and effective leaders must be able to balance operational demands with the well-being of their team. Unfortunately, history has shown us that 9 out of 10 in leadership positions don’t particularly care about their team. This can come about  because they are not aware of what it takes to be the agent on the ground, or because of their own past experiences in very much different environments. They expect their agents to work overtime (mostly without being paid for it) or handle unreasonable workloads without considering the impact on their wellbeing and operational performance. It still baffles us that many do not seem to grasp the fact that if you overwork your agents, their attention to detail and their reaction time to incidents will suffer significantly. And we all know how important these two areas are for a protective detail!

Some will even go to extra lengths to ask the agents to do duties that are outside their scope of work, because they do not want to “inconvenience” their clients by making proper demands. And we have found out, instead of standing up for their teams, they are terrified to speak to their clients. They allow their ‘Boots on the Ground’ (who are the most important part of any security detail) to be abused and mistreated, instead of doing what their job calls for, which is to be the go-between and make sure the team has what is needed and that they are all being taken care of.

And for those reasons, this is the type of additional training, skills, and mindset critical for such roles:

Leadership and Management Training: Leadership courses can teach skills like conflict resolution, team building, and emotional intelligence. Leaders who can inspire trust and foster a positive team culture are more likely to achieve long-term success.

-Human Resource Management: Training in hiring practices and personnel management is crucial for selecting the right candidates and building a well-rounded team. Leaders should learn how to conduct behavioral interviews, assess qualifications, and identify red flags during the recruitment process.

-Operational Planning and Logistics: Advanced training in operational planning can help leaders create efficient schedules, optimize resources, and assign roles based on individual expertise. This ensures that every team member contributes their best to the mission.

-Empathy and Emotional Intelligence: Leaders must cultivate professional empathy—understanding their team’s needs, limitations, and aspirations. This includes setting reasonable work hours, recognizing accomplishments, and providing support during challenging assignments.

When TLs and Operations Managers possess well-rounded skill sets, the entire team and client benefits.

A leader with HR skills can build a diverse and competent team, ensuring that each member contributes unique strengths to the operation. By aligning team members with tasks that match their expertise, leaders can enhance efficiency and job satisfaction.

A leader who shows empathy and prioritizes work-life balance, fosters loyalty and motivation, leading to better performance and lower turnover. When the team operates seamlessly under skilled leadership, clients receive a higher level of service, strengthening the organization’s reputation.

The roles of TLs, Security Managers, and Operations Managers in executive protection are too critical to be entrusted to someone whose value is solely based on some specific skillset unrelated to the role. While some backgrounds can be valuable, they must be complemented by additional training and skills in leadership, human resources, operational planning, and empathy. Only then can these leaders effectively hire, manage, and deploy their teams, ensuring operational success and client satisfaction.

For the EP industry to continue evolving, it’s time to prioritize comprehensive development for those in leadership positions. This is not just a recommendation—it’s a necessity for the future of executive protection.

#ExecutiveProtection #LeadershipDevelopment #SecurityManagement #SecurityOperations #RiskManagement #TeamLeadership #CorporateSecurity #SecurityTraining #TeamLeader #ProtectionSpecialist #CrisisManagement

Identifying Suspicious Behavior: Essential Pre-Attack Indicator Training for Executive Protection Agents

An article by Bob Duggan, Founder & President, Executive Security International

Senior executive protection professionals will all agree that the number one goal when performing protective details is to prevent a threatening or embarrassing situation before it becomes a reality for your client. Now, we all know that the majority of EP schools are highly invested in the ‘’cool guy skills’’. They spend hundreds of hours training in martial arts, firearms, evasive driving, etc. While those skills are important for anyone involved in the executive protection industry, we should not forget that equally important are the skills that will provide these agents with the necessary knowledge and tools of how to prevent a threatening situation.

Identifying suspicious person in a crowd

After more than 6 decades in this profession and having taught thousands of students, I can never highlight enough how important it is to have the ability to identify suspicious behaviors and clues to dangerousness. It is safer for both the client and the security team if the agents have a more proactive mindset rather than a reactive one. We all know by experience,  and from the hundreds of case studies, that no matter how skilled you are in martial arts or how great of a sharpshooter you are, when the moment comes and you have to respond to an attack, it doesn’t matter how many bad guys you can fight or shoot, or how fast or skillful you can drive. Because at that moment, the result of the fight will be determined by many factors other than your skills in fighting or shooting. How an attack toward your client will end depends on numerous variables such as the method of attack, the number of attackers, how well equipped they are, what kind of weaponry they are using, the attack area or “The X”, and most importantly, each one of the EP team member’s mental preparations to respond. Remember, the bad guys have done their homework, and they know your weak spots, and how and when to attack. So, they do have the upper hand in the surprise. Always keep in mind…They only have to get it right once…You have to get it right all the time.

And let’s not forget that while you are fighting or shooting publicly in the open, your client is quite exposed, could be seriously harmed, and will undoubtedly be scared emotionally for life! The fact that you could not foresee and/or plan to prevent a situation that put them at such risk is considered a failure. So, wouldn’t it be safer for everyone, and your job, to be able to prevent a threat instead of merely reacting to it? Again, the senior executive protection professionals will say over and over that the best protective details are not those based on force, numbers, or use of firearms, but those based on foreseeing an upcoming threat or embarrassing situation and preventing it. In the highly demanding and fast-changing world of protective details, the difference between a secure environment and a potentially dangerous situation is purely based on the agents’ ability to preemptively recognize and respond to suspicious behavior.

For more than 4 decades, at Executive Security International (ESI) we have been teaching thousands of students behavioral intelligence and how to identify clues to dangerousness. In simple words, we have been educating them on how to understand an attacker’s behavior, what are pre-attack indicators, and how to identify clues to dangerousness and suspicious behaviors.

Pre-Attack Indicators – Clues to Dangerousness

Pre-attack indicators are specific behaviors or actions that precede an attack, or illegal/bad act, and can serve as a warning to the observant protection agent that something wrong is going to take place. These indicators can vary widely but often include unusual patterns of body movements, facial expressions, gaze, overt interest in security measures, or attempts to breach the personal boundaries of the protectee. In the milliseconds prior to an attack, human predators quite often assume the physical features of apex predator animals as they close in on their prey/target. Being able to identify and understand these indicators requires the proper training on behavioral clues and a psychological insight into the mindset of potential attackers.

“Reading suspicious behavior”

One may ask, “Is it possible and easy to read others? Especially when it comes down to suspicious behavior?” Based on scientific evidence and real-life incidents, we can testify that it is possible and if trained properly, it is easy to do so. As with all skills, being able to read others and the environment around you requires constant training and good observation skills. After all, we can’t process the information we don’t see, correct?

Humans are emotional creatures, and what they feel (anger, fear, stress, happiness, embarrassment, etc.) can be seen through their body language or facial expressions. We can all tell why a child who is confronted by his parents is hiding his hands behind his body, or why some people are pacing back and forth in a hospital waiting room. In the same way, you can learn to identify suspicious behaviors and stop an attack before it takes place by simply observing peoples’ behavior, like someone who is going to commit an attack, either a suicide bomber or an attacker. They will display either stress, fear that they may be caught and fail their mission, or be under the influence of drugs. Being taught how these emotions are expressed through body movements and facial expressions can help you identify clues to dangerousness.

After the Manchester Arena terrorist attack that shook British society and the whole world, one of the event security guards, Kyle Lawler, said that the terrorist was reported by a member of the public who, he himself thought the person looked ‘’dodgy’’, and one of Showcase’s stewards also had a look at the terrorist minutes before he detonated his bomb. As Lawler continued with his testimony to the police, and according to The Guardian article, we read that:

“As Ali (Showcase steward) turned to have a look he’s (the terrorist) clocked that we are looking at him. He’s become fidgety with his hands. No sudden movements. He was watching us, watching him.“He would kind of look, slightly look away and look back at us.”In his statement to police, Lawler said: “I just had a bad feeling about him but did not have anything to justify that.”He said Abedi was “fidgety and sweating” and he said he panicked slightly and was “conflicted” because he thought something was wrong but could not put his finger on it, the inquiry heard.”

What we see in this horrific incident is that at least three people were aware of a suspicious presence/behavior. A member of the public who saw “something wrong” reported it to a security guard and an event steward. According to the description, we see a very usual behavior by someone who is going to do something bad. “He’s become fidgety with his hands” because he was stressed, “He would kind of look, slightly look away and then look back at us” because he wanted to make sure he wasn’t caught or somebody had spotted him, and he was “fidgety and sweating”, because he was showing signs of stress.

Looking at the last statement made by the security guard, he found a specific behavior wrong, and he felt conflicted because he didn’t know how to interpret it. Here again we see the importance of training Executive Protection professionals (and anyone related to the security industry) behavioral intelligence and clues to dangerousness. The sad part of this situation is that three people, without training, spotted something they knew was wrong and if they had been trained properly, they would have known why something looks wrong and how to deal with it. Perhaps, in this particular case, the outcome would have been significantly different with quite a lower number of casualties.

Another incident, definitely worth mentioning and studying is that of the on-camera assassination of Russian ambassador to Tukey, Andrey Karlov, who was shot dead at an Ankara gallery by a Turkish policeman who wanted to protest Russia’s involvement in the Syrian war. By watching the video, one can see the clear pre-attack indicators of the assassin, minutes before he starts shooting. For those of you who have seen the video, we invite you to watch it again and this time pay attention to the following findings:

  • His pacing in the background shows signs of stress.
  • When he stands still his feet are planted wider than his shoulder’s width which shows a person who is ready to get physically engaged.
  • He has interlocked his fingers with his thumbs touching each other which shows an elevated level of stress.
  • He touches his jacket frequently, which is a sign of soothing movement.
  • He is also seen to be checking his firearm. And at one point, beginning to go for the firearm, he regrets it and seconds later he touches his face, which is another sign of stress. Blood is gathering around the mouth and nose area.
  • His face shows contempt, which is very frequent with terrorists.

A significant point to also consider is that he was an off-duty officer, showing up at an event he had no business attending, and being in close contact, was somehow allowed to place himself behind the victim in a live event. This in combination with the rest of the signs should have been a big red flag for what was about to unfold.

politician greeting crowd

The majority of the assassinations, terrorist attacks, and other physical attacks, could have been prevented if security personnel were trained in how to identify clues to dangerousness. Effective protective operations are those where the agents anticipate potential scenarios and prepare accordingly, rather than merely reacting to events as they unfold. The role of an executive protection agent is more about preventing incidents than it is about responding to them.

We started implementing our studies and experience, on behavioral intelligence and body language, into our Executive Security International’s executive protection courses since the mid 80’s. From the early days of my career, I have been fascinated by, and at the forefront of exploring how, someone’s body language and movements within a crowd can serve as crucial indicators of intent, in particular, nefarious intent to harm our clients. After years of protecting celebrities and high-net-worth families, both abroad and in the U.S., my observations led me to investigate and study further about body language and microexpression clues and how, by observing them, one can identify suspicious behavior.

In 1985, I came across the groundbreaking work and research of Dr. Paul Ekman, whose studies on facial expressions and emotions deepened my understanding of deception detection. Although Ekman’s research wasn’t directly linked to aggression, it convinced me that trained observers/executive protection agents could spot the pre-indicators of assault and guide these agents toward strategies of preemptive intervention and therefore, prevention.

It’s important to highlight here that much of today what training institutions teach security personnel about situational awareness (SA) seems to be superficial. Five years ago, we realized that in practice, SA terminology often means the agent is merely waiting for something to happen. Still, many use ‘Situational Awareness’ as a reactive intervention strategy, which leads to late reactions, resulting in client harm or embarrassment. It is crucial for anyone interested in learning more about this field to understand that, while observing behavioral cues is critical, the key is to preemptively engage by confronting the Person of Interest (POI) through soft entry or hard contact. Preemptive Intervention now means engaging the POI, communicating with team members, and seeking a resolution before any actual contact with the client. Going back to our reference on the Manchester Arena terrorist attack, if the security guard was trained in how to engage with a suspicious person for that “first interview”, most likely he would have gotten a good idea that there was something wrong that needed to be reported and investigated further BEFORE that person/visitor could proceed further into the event facility. We will analyze this method in a topic that we will develop in depth in our next article.

Today, when we talk and teach about Behavioral Intelligence, Clues to Dangerousness and Predator Hunting/Preemptive Intervention in our ESI classes, we teach with knowledge that is backed up with both real-life experience and thorough research since the early 80’s. We are very passionate about this topic because we genuinely believe in its highly proactive approach. The skill to read behavioral clues has been tested and it has been proven that it works, and the ability to “read others and the environment around you” remains the cornerstone of effective security and protective measures.

Bob Duggan

Founder & President

For those interested in learning more about behavioral intelligence and clues to dangerousness, please visit www.esibodyguardschool.com 

Keeping C-Suite Executives Safe

There have been many reported incidents surrounding violence towards C-suite executives, with the most well-known case, the murder of the tech executive Bob Lee, founder of Cash App in San Francisco, last year and the death of Vivek Taneja, who was assaulted in downtown D.C. on February 2nd and succumbed to his injuries a day later. These incidents, along with many others, bring again to light the ongoing issue with crime rates in specific areas and the potential dangers that corporate leaders may face. We can all agree that in today’s world, the safety and security of high-profile individuals, particularly C-Suite executives, has become paramount. Targeted attacks, opportunistic attacks, kidnappings, thefts, workplace violence, cyber threats, natural disasters, and active shootings are some of the frequent risks that can pose a threat to their safety.

Photo by Christina Morillo on Pexels.com

The Reality for Many Executives

One thing that the public does not know is that, unlike high-profile politicians or celebrities who often have round-the-clock security details, many C-Suite executives operate day-to-day without the constant presence of protective teams. Whether they are traveling for business, attending business meetings and conferences, or simply going about their daily routines, these individuals may find themselves exposed to various threats without the support of a security entourage. Often, the cost of their safety is not considered to be within their company’s budget, and many of them are fairly resistant to having a team of protectors consistently around them.

Opportunistic and Targeted Threats

  • Pava LaPere, a 26-year-old tech entrepreneur, was found dead on the roof of her building, half-naked, strangled, and brutally beaten with a brick. She was killed by Jason Billingsley who, having been under police surveillance for another woman’s sexual abuse, was allowed to enter the building by LaPere herself.
  • 51-year-old Forrest Hayes, the former senior director of Apple’s worldwide operations, was killed by a high-priced prostitute who injected him with a lethal dose of heroin and then left him to die on his luxury yacht.
  • In 2019, Tushar Atre was kidnapped from his own home early in the morning hours and later on found dead. He was stabbed and shot multiple times.
  • In 2022, Artemis Seaford, a high-level executive at Meta and dual US. – Greek national, was found to be surveilled by surveillance-for-hire software for around one year. Seaford was another victim of the “Greek Watergate,” for which the Greek government has been accused of spying on a number of its own citizens, including politicians, journalists, activists, and business owners.

As we know and can clearly see from multiple cases, threats can come from any direction and at any given opportunity. Those of wealth or stature in society find themselves to becoming a target or being “condemned” by groups who feel that they somehow deserve more and that their goal to achieve is best obtained through violence of some sort. We all saw how executives and personnel from pharmaceutical companies were targeted during the Covid lockdowns and how specific minorities (Asian) have been singled out for harassment recently due to the tedious stories surrounding the supposed origins of Covid as well as the tedious political arena of U.S/Chinese relations. Russian businessmen/women have become victims of various crimes against themselves, their families, assets, and companies.

Photo by Rebrand Cities on Pexels.com

How many Americans are targeted while overseas during their business or leisure trips, and how many executives are regularly targeted during company layoffs as well? While the first thing that comes to mind is the importance of preserving human lives, organizations have to also realize that any harm done to their executives and employees will have a tremendous impact on their business. The loss of the leaders in their business (the brains behind their products), the loss of their intellectual property, and the disturbance of their daily operations will cause the employees and customers to lose faith in them and they won’t feel safe within their facilities anymore.

Keeping Executives Safe

One may ask, how then can executives be safe and protected against natural disasters or physical and cyber security threats if they cannot be provided with a security team? The different attacks, the threat level, the fast social-political-geopolitical changes, and incidents that have already taken place, underscores the critical need for C-Suite executives to be better prepared and equipped with basic safety procedures and skills to ensure their well-being in the absence of dedicated protection.

Corporations have a responsibility to invest in the education and training of their executives to mitigate risks and safeguard their well-being. By providing specially designed safety training programs, companies can empower their leaders with the tools and knowledge necessary to protect themselves and make informed decisions in challenging circumstances. Not only will a safety training program benefit the individuals and organizations by saving lives, but it will also help with mitigating legal and financial risks, protecting intellectual property, protecting daily operations, improving productivity and morale, demonstrate corporate social responsibility, and enhance company’s reputation. We know that not all organizations have physical security teams for their executives. Some may not have the budget for it, and some, though the evidence is quite clear, do not see the necessity for it. However, there is a way for all businesses, big and small, to make their people safer.

Safety Educational Programs for Executives

Our team at LeMareschal has had the pleasure of conducting private classes for C-Suite executives and tech companies’ employees in the past. From our experience, we found out that many approach the training with an open mind and realize early on how much they need it, and some even say “I wish I would have done this earlier”. When you decide to provide these type of training options to this specific target group, you should consider who these people are and which environments they exist, create, and travel within.  The purpose of these training programs is to provide them with the situational awareness that is required to navigate in the society that we live and travel in, and the knowledge and skills needed to protect themselves and their employees from potential safety risks. In today’s world, personal safety is increasingly important for everyone!

Considering the fact that many of these executives and employees are very busy individuals, there is a time restriction issue that you will always have to compete with. The training has to be long enough to give them a solid understanding of included topics, but also short enough to make it possible for them to attend. Sometimes people and organizations may be interested, but the timeframe required doesn’t allow them to give it any serious consideration.

 

What Topics Should an Executive Be Trained in?

As we’re sure there are quite of number of opinions on this subject, we have listed below some of the topics that we have found to be most helpful.

Situational Awareness – How to be aware of their surroundings and identify potential threats. This includes identifying dangerous areas, suspicious individuals, and potential safety hazards.

Body Language and pre-attack indicators – How to identify suspicious individuals according to their body language and facial expressions. This will also teach them how to identify deceit.

Basic Threat Assessment – How to assess potential threats to their safety, including identifying potential risks in their work environment, while traveling, and even in their homes.

Cybersecurity Awareness – Executives must be taught the importance of cybersecurity and how to protect their personal and professional devices and their confidential information from online threats.

Travel Safety – How to stay safe while traveling, including how to navigate unfamiliar locations, how to use public transportation safely, how to avoid common travel scams, how to be safe in regards to hotels, how to identify and estimate risks while travelling, how to plan for a safe trip and what to consider when preparing in advance.

Cultural Etiquette – How to avoid risk and embarrassment and how to draw less attention by adapting to local cultural behaviors.

Emergency Preparedness – Executives will gain the knowledge and skills needed to respond to emergencies, including natural disasters, medical emergencies, and active shooter situations.

Active Shooters – How to respond in the case of an active shooting situation. What steps to take to protect themselves and others.

Security Measures – How to secure their homes, offices, and personal belongings to reduce the risk of theft and burglary and how to use personal protective equipment and apps.

Stalking and Harassment – How to identify stalking signs, how to report it, and how to deal with it before it escalates.

Conflict Management – How to identify different categories of conflict, how to manage it properly, and how to de-escalate situations as they arise.

First Aid – This will help executives learn the basic first aid skills in case they have to respond to medical emergencies and injuries until professional help arrives.

 

In an era where threats to personal safety are ever-present, investing in the education and training of executives is not just a prudent business decision, but a wise preventative strategy. By equipping the ‘’brains’’ of your organization with the necessary skills and knowledge to protect themselves, your corporation can mitigate risks, protect your most valuable assets, and demonstrate a commitment to the well-being of your leadership team.

LeMareschal’s subject matter instructors are ready to come alongside and instruct your organization on how to be safe, more aware, and thus highly productive.

Any further questions? Give us a call for a free consultation.

The Importance of Effective Communication Between Protectee and The Executive Protection Team

The last few days have produced a video of the meeting between Vladimir Putin and Justin Trudeau and has been making the news within the executive protection industry circles as it shows the great communication levels between Putin and his EP agents. This is highlighting once again the importance of communication between the protective team and the principal. Although it is a subject rarely mentioned in EP training schools, communication is vital, especially in an industry where safety is the prime objective and split-second decisions can make all the difference, sometimes even between life and death.

Photo by August de Richelieu on Pexels.com

Long gone are the days of an EP agent being considered just a body or a gun for hire. The industry has changed, and with that has changed what the definition of an EP agent is and what responsibilities fall under their roles. Being able to communicate effectively with your team members, your client, and anyone else around the client is vital for a successful operation. Consider the scenario where you are on a detail and you have to communicate with your client in a covert way, because something changed, and you have to move. Or your client is meeting with fans or has a personal meeting and someone is making him feel threatened, scared, or insulted. You need to be able to know when to act and your client must be able to understand your directions and most importantly be able to follow them up.

Now, the simplest definition of communication is defined as a process that involves sending and receiving messages through the verbal and non-verbal methods. And as with many other forms of communication, it needs two sides to function properly. For the sender, and the receiver, when we talk about communication between an EP agent and the protectee, it is important to have both sides invested in effective communication, otherwise it won’t work effectively. In high-pressure situations, split-second decisions can mean the difference between safety and peril. Effective communication enables the protection team to relay vital information promptly, allowing them  to make informed decisions in the blink of an eye. Whether it’s identifying an exit strategy, assessing the credibility of a potential threat, or removing themselves from a potential dangerous or embarrassing situation, clear and concise communication between EP teams and their clients is paramount.

Mutual Understanding Between Protectee and EP agent

Mutual understanding is important for effective communication and goes beyond mere verbal exchanges; it includes a deep comprehension of the protectee’s habits, preferences, emotional state, body language, current situation/environment, and potential vulnerabilities. It also means that the protectee has a good understanding of what his/her protective team can do and trusts their abilities, judgment, and they themselves as professionals.

Building Effective Communication

Many will tell you that clients have to go through training classes with them. The reality is, it is very rare, if not impossible, for a client to be willing to attend a class with his EP agents, they feel it is our job, they have much more important things to attend to. In our 56 years of combined experience, we only saw one client, ONE, who took a four-day class with his protective team. And the reason he did it was because the client himself was quite interested in anything “tactical”. The majority of your clients either hate guns, value their time more, or do not have the slightest interest to learn anything about safety, “Better things to do”. Don’t forget, that is what they hired YOU for…

However, there are ways to build effective communication with your clients.  

  1. Learn your client well. This is probably one of the most important steps for building effective communication. Take your time to learn about the people you will be protecting, know if they have any physical or psychological issues (it can affect how they express themselves). Learn how to “read” their body language, like when they feel discomfort, are scared, embarrassed, angry, and even what they like or dislike. Although this is hard when you are hired for short gigs, because you don’t have the luxury of time, try to learn some information from their PA’s or previous EP agents who may have worked before you.
  2. Be situationally aware. In our industry, real-time awareness and dynamic risk assessment are non-negotiable. Make sure that you know well what is going around your client and how specific people or behaviors make them feel, as well as be aware of any potential suspicious people or threats toward them.
  3. “Read the room”. ‘Reading the room’ involves grasping the nuances of the environment, the people present, and the emotions prevailing within the space. It requires constant vigilance and adaptability to ensure proper communication, positive cooperation with the client, and everyone else surrounding them, as well as the client’s safety and well-being at all times. “Reading the room” helps executive protection agents detect emotions and adapt their approach, conversational tone, or, in many cases, just remain quiet. By closely observing body language, facial expressions, and interactions among attendees, staff, corporate members, and even family members, agents can identify not only “moods” but also individuals who may pose a risk to the client’s safety.
  4. Act accordingly. Many colleagues fail to act accordingly to the threat/situation/environment because they are so programmed to ‘’impress’’ the protectee, leading them to over abuse their roles and their use of power/authority and ending up either embarrassing the client or disrupting their moment/meeting. If you overreact once or twice the client will stop following your directions when there is actually a need and time to do so. Bottom line: Don’t over react unless there is a reason to.
  5. Keep Protectee Informed.  Consider making sure that the protectee remains informed about any potential threats or changes in the security environment. Whether it’s a BOLO on a specific person, shift in the itinerary, a sudden change in the protectee’s schedule, or an unexpected development, open lines of communication empower both parties to respond proactively, mitigating risks and ensuring a seamless flow of operations. It also helps with building trust with the person you protect. They feel involved, valued and understood, and they are more likely to follow-up with your directions in the case of an emergency. By actively listening to your protectee’s concerns, addressing their needs, and keeping them informed every step of the way, you can create a sense of mutual trust that forms the cornerstone of an effective protective operation. Something to consider though, do not overdo it! Use simple language (avoid professional terminology) and keep it simple and to the point.

Effective communication, as in the example of the video with Putin and his EP agent, may seem impressive. It is, but what you should know is that there is a lot of time invested by both parties to reach that level. As you become able to read your clients, they will also begin to read you as well. If you have a good relationship, they will be able to read into your body language as well and know what is coming so they can prepare themselves and follow your directions quickly. A protective detail is like a good watch mechanism. Everyone involved is a piece of it and plays a big part in making it work…Like a clock…

The Protector’s Resource Hub is here! and, is free!

Welcome to the official resource hub for Executive Protection Agents, offered by LeMareschal Protection & Intelligence Solutions. Understanding the unique challenges and dynamic environments faced by agents daily, our goal is to equip you with an arsenal of essential tools and links. From links with free educational courses, real-time threat intelligence sources to advanced protection methodologies and free templates, this page is designed to enhance your operational efficiency and situational awareness. As leaders in the protective and intelligence industry, we believe in empowering our community with the best resources, ensuring seamless protection for all.

Photo by Armin Rimoldi on Pexels.com

Disclaimer: This page serves as a resource of links directing you to external, third-party websites. We are not responsible for the accuracy or content of information presented on these external sites. Please do your due diligence and use these suggestions as you see fit.

FREE Educational Courses

  1. Council of Europe https://help.elearning.ext.coe.int/
  2. FEMA https://training.fema.gov/is/crslist.aspx?page=2&lang=en
  3. TRIPwire https://tripwire.dhs.gov/training-education/counter-ied-training-0#faq-question
  4. Center for Development of Security Excellence- Defense Counterintelligence and Security Agency https://www.cdse.edu/Training/eLearning/
  5. ESRI academy https://www.esri.com/training/catalog/search/
  6. MSG https://www.managementstudyguide.com/corporate-etiquettes.htm
  7. NWC https://usnwc.libguides.com/c.php?g=494120&p=3381401
  8. Disaster Ready Org https://www.disasterready.org/
  9. Basel Institute of Governance https://baselgovernance.org/basel-learn
  10. My Languages Org https://mylanguages.org/
  11. UNODC https://www.unodc.org/e4j/en/tertiary/counter-terrorism.html
  12. UNODC Global E-Learning https://www.unodc.org/elearning/en/courses/course-catalogue.html
  13. United States Institute of Peace https://www.usip.org/academy/catalog-global-campus-courses
  14. Counter-Terrorism Training Suite https://ct.protectuk.police.uk/
  15. United Nations Department of Safety & Security https://training.dss.un.org/
  16. UNICEF https://agora.unicef.org/
  17. TEEX https://teex.org/class/AWR375/
  18. Geneva Centre for Security Sector Governance https://www.dcaf.ch/resources?type=elearnings
  19. SANS Institute https://www.sans.org/cyberaces/
  20. NIST https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online-learning-content
Photo by Lisa Fotios on Pexels.com

FREE Resources/Tools

  1. Counter Terrorism Guide https://www.dni.gov/nctc/index.html
  2. Centre For Research and Evidence on Security Threats https://crestresearch.ac.uk/resources/
  3. Health and Safety Executive https://www.hse.gov.uk/simple-health-safety/risk/risk-assessment-template-and-examples.htm
  4. Human Security Collective https://www.hscollective.org/our-resources/our-resources/?acceptCookies=65c2c526e98d0
  5. National Sex Offenders Public Website (USA) https://www.nsopw.gov/search-public-sex-offender-registries
  6. Counter Extremism Project https://www.counterextremism.com/about
  7. SPLC https://www.splcenter.org/hate-map
  8. Stanford Center for International Security and Cooperation     https://cisac.fsi.stanford.edu/mappingmilitants
  9. Global Network of Extremism and Technology https://gnet-research.org/
  10. Bellingcat https://www.bellingcat.com/category/news/?fwp_categories=news
  11. Media Bias Fact Check https://mediabiasfactcheck.com/center/
  12. 2023 Index of Economic Freedom https://www.heritage.org/index/about
  13. ESRI real-time mapping NYC https://coolmaps.esri.com/#12
  14. FBI Study of Pre-Attack Behaviors of Active Shooters in the United States Between 2000 and 2013 https://www.fbi.gov/file-repository/pre-attack-behaviors-of-active-shooters-in-us-2000-2013.pdf/view

The Role of Counter-Surveillance in Executive Protection Operations

One of the most underestimated skills of an executive protection agent is counter-surveillance tactics. This specific topic is either being touched on for a brief time during EP courses or not covered at all. Within the functions of protective operations, counter-surveillance plays a pivotal role in mitigating risks and ensuring the effectiveness of protection strategies.

When most people think about bodyguards, they think about the people who are around a celebrity or an important public figure. They do not know that executive protection is more than just protective agents surrounding a VIP. It involves a comprehensive approach to security, involving thorough planning, risk and threat assessments, intelligence gathering, comprehensive advance work, and strategic responses. While visible security measures (such as bodyguards) are important, the covert and preemptive aspects are equally critical to a successful protection operation. Counter-surveillance is the art and science of identifying and countering threats before they manifest, making it an indispensable tool in the executive protection toolbox. It is such an important area that it needs to be properly studied.

Photo by Burak The Weekender on Pexels.com

Why are specific people at risk for surveillance? The objective of surveillance is to monitor, record, and analyze the movements and activities of individuals or groups to gather information. Criminals use surveillance to discover what your weaknesses are to do you harm (especially terrorist organizations), and paparazzi use it to find your patterns so they can predict your next move and where to find you next. Some other reasons individuals or entities may be surveilled is to gather business intelligence or other personal motives such as private investigations, often relating to legal matters or personal disputes. An all-new group of people who use surveillance against their victims are sex predators and stalkers. The intention of these individuals is obviously for kidnapping, trafficking, and harm to their victims.

Understandably, there are many risks associated with being followed or monitored, such as:

  • Compromised Personal Safety: Surveillance can be a precursor to more direct threats such as physical attacks, kidnapping, or ambushes.
  • Privacy Invasion: Persistent surveillance can lead to significant invasions of privacy, affecting the mental well-being and sense of security of the clients and their family members.
  • Information Leakage: Surveillance can result in sensitive or confidential information being intercepted, posing risks to both personal and corporate security.
  • Behavioral Alteration: Knowing one is being watched can lead to altered behavior, which can impact the client’s performance and decision-making.

What is Counter-Surveillance? Counter-surveillance is the proactive practice of monitoring and countering potential threats, hostile surveillance, or intelligence-gathering activities aimed at the protected individual or group. It involves the use of advanced techniques, technology, and trained personnel to detect, deter, and neutralize potential threats while avoiding confrontation.

And it can be crucial for the following reasons:

  • Early Threat Detection: One of the primary advantages of counter surveillance is the ability to detect threats in their early stages. Hostile individuals or groups often conduct surveillance to gather information, assess vulnerabilities, and plan attacks. In his book “I was Born on November 17”, Dimitris Koufontinas, one of the most notorious domestic terrorists in Greece and the leader of the infamous November 17 terrorist organization, (responsible for the assassination of CIA Chief of Station Richard Welch and 4 other Americans as well as the killing of at least 19 other individuals), explained in detail the tactics of how the terrorist organization would conduct surveillance on their targets. A very educational read for those interested in learning from the adversary. In such events, effective counter-surveillance can intercept early surveillance attempts by raising awareness and allowing security teams to intervene before a threat materializes.
  • Reducing Vulnerabilities: Counter surveillance helps protect individuals by identifying weaknesses in their security protocols. By pinpointing potential vulnerabilities or patterns that could be exploited by malicious actors, protective measures can be adjusted or strengthened to minimize risk. Weaknesses can be found in the biggest and most sophisticated protective operation, no one is immune.
  • Preventing Ambushes or Attacks: Surveillance is often a precursor to ambushes or attacks. Counter surveillance can identify suspicious individuals or activities that may indicate imminent danger, allowing security teams to take proactive measures to prevent an attack.
  • Enhanced Situational Awareness: Counter surveillance teams provide real-time intelligence, which enhances the situational awareness of executive protection personnel. This enables them to make informed decisions, adjust routes, and respond effectively to changing circumstances.
  • Protecting Privacy: Counter surveillance also plays a role in protecting the privacy of high-profile individuals. By identifying and deterring paparazzi or overzealous fans, it allows clients to maintain a degree of personal space and control over their lives. In one of our previous podcasts with a retired famous paparazzi, he admitted that he knew where to find celebrities because they had a routine life and used the same restaurants or bars over and over again.
Photo by Aleksandar Pasaric on Pexels.com

Things to consider during counter-surveillance operations. A good counter-surveillance agent is the one who understands the tactics of surveillance practices. As we mentioned earlier, surveillance and counter-surveillance are a very specialized area within protective operations and one needs to dedicate a good amount of specialized training to it. Something to consider for those EP agents who want to learn more.

Before diving into counter-surveillance, it’s essential to grasp the concept of surveillance itself. Learn from your adversary. In order to be able to counter an act, you must know how to perform the act. Previously, we explained who may be conducting surveillance on you or your client and why. Below, we will analyze the methods of surveillance, the various methods used, different forms a surveillance can take, and commonly used techniques. If you know how your adversary operates, you will be more skilled in anticipating their moves, identifying surveillance, and mitigate risks.

Methods of Surveillance: Surveillance methods vary greatly depending on the objectives and the technology available. Common methods include:

  • Physical Surveillance: Involves the physical observation of a person or place. It can be either stationery (watching from a fixed position) or mobile (following the target).
  • Technical Surveillance: Utilizes electronic devices like cameras, microphones, GPS trackers, and wiretapping equipment to monitor and record activities.
  • Cyber Surveillance: Involves monitoring online activities, including email communications, social media interactions, and browsing history.
  • Aerial Surveillance: Uses drones or other aircraft to observe from above.
  • Agent-Based Surveillance: Involves human intelligence where individuals gather information through personal interaction or infiltration into a group.

Tools Used in Surveillance: Surveillance tools range from simple binoculars to sophisticated electronic equipment:

  • Optical Surveillance Tools: Binoculars, telescopes, and cameras.
  • Audio Surveillance Tools: Listening devices, voice recorders, and wiretaps.
  • Electronic Surveillance Tools: GPS trackers, motion sensors, and digital monitoring software.
  • Data Surveillance Tools: Software for monitoring internet activity, including email interception and network monitoring.

Forms Surveillance Can Take: Surveillance can take several forms, including:

  • Covert Surveillance: Conducted without knowledge of the subject.
  • Overt Surveillance: Visible and obvious monitoring, often used as a deterrent.
  • Personal Surveillance: Focused on individuals or small groups.
  • Mass Surveillance: Broad monitoring, often of large populations or areas.

Common Techniques Used in Surveillance: Surveillance techniques will depend on the purpose and context.

  • Tail Surveillance or “Tailing”: Following a subject discreetly.
  • Stationary Surveillance: Observing from a fixed point.
  • Electronic Eavesdropping: Listening in on conversations or communications.
  • Cyber Monitoring: Tracking online activities and digital footprints.
  • Pattern Analysis: Studying routines and behaviors for anomalies.

Counter-surveillance 101

Counter-surveillance tactics are critical for executive protection teams to ensure the safety and security of high-profile individuals. These tactics help identify and mitigate potential threats and hostile surveillance. One of the most important aspects of counter-surveillance is being able to identify suspicious people/behaviors. For this, we will use the U.S. government acronym TEDD which illustrates the principles one can use to identify surveillance. TEDD stands for Time – Environment – Distance – Demeanor. In other words, if a person sees someone repeatedly over a particular timeframe, in different environments and/or at distances not proximal to each other, or one who displays a poor demeanor, then it can be assumed he or she is under surveillance.

When an individual becomes the specific target of a planned attack, they may find themselves subjected to various elements of surveillance, including time, environment, and distance (TEDD). However, if the focus of the threat is directed towards a location, such as a subway or a government facility where the individual works, the primary element to be aware of is demeanor. Demeanor, in this context, refers to a person’s behavior that appears unusual or unnatural, or his presence is unjustified. This behavior can range from overtly suspicious actions, such as loitering without a clear purpose or reason for being in a particular place, to more subtle signs that are almost undetectable to an observer. Sometimes, it’s a gut feeling or a sense that something isn’t right, rather than something visibly obvious.

Signs of poor demeanor may include:

  • Mirroring: Acting in sync with the target’s movements, indicating a potential attempt to monitor or follow them.
  • Communication: Making efforts to communicate or coordinate with others when the target moves, possibly signaling collaboration within a surveillance team.
  • Avoiding Eye Contact: Refraining from making eye contact with the target, potentially to avoid drawing attention or revealing intent.
  • Unnatural Behavior: Signs of emotional stress, such as nervousness, excessive enthusiasm, or noticeable sweating.
  • Abrupt Movements: Making sudden turns, stops, or changes in direction that seem out of place or unnatural.
  • Extended Presence: A person who remains in a specific area for an unusually long period without an apparent reason.
  • Unjustified Contact: Repeated or unplanned interactions with a specific person without a clear explanation.
  • Unjustified Presence: A person whose presence in a particular location or at a specific time is not easily justified or explained.
  • Pattern Repetition: Multiple individuals displaying similar behaviors or signs.
  • Standing Out: Someone who noticeably differs from the surrounding crowd in some way.
  • Intuition: Trusting your instincts when you get a bad feeling or sense that something is amiss.
  • Observing Hands: Pay attention to whether individuals are holding anything that could be used as a weapon or a tool for kidnapping.
  • Covert Communication: Monitoring for signs of communication, such as texting, hand signals, nods, repeated eye contact, or any unusual interactions when you move.

 

In the context of terrorism, displaying a poor demeanor can also involve:

  • Inappropriate Attire: Wearing clothing that is unsuitable for the weather, like donning heavy coats in the summertime, or exhibiting unusual bulges or wires under clothing that might suggest concealed weapons or devices.
  • Physical Discomfort: Showing signs of nervousness, such as excessive sweating, mumbling, or fidgeting.
  • Avoiding Security: Deliberately attempting to evade security personnel or behaving in a manner that raises suspicions when encountering security measures.
  • Unusual Baggage: A person carrying bags, suitcases, or luggage that appears out of place or disproportionate to the situation.
  • In addition, according to some reports, suicide bombers often exhibit an intense stare as they approach the final stages of their mission. They seem to have tunnel vision, being able to focus only on their intended purpose or target. They may also be under the influence of drugs.

 

We have to highlight that poor demeanor encompasses a wide range of behaviors and signs, from the overtly conspicuous to the subtly unusual. Being vigilant and aware of these indicators can help individuals recognize potential threats and take appropriate actions to ensure their safety in various situations, especially in environments where security risks are a concern.

Photo by Kaique Rocha on Pexels.com

Recognizing signs of being followed is critical for executive protection teams. One should be on the lookout for:

  • Repetition in Appearances: Notice repeated appearances of the same vehicle or person(s) in different locations or over time.
  • Unusual Patterns: Highlighting patterns such as a person on foot or in a vehicle making the same turns, stopping when you stop, or lingering in the same areas.

-Using your peripheral vision, mirrors, and other reflective surfaces (like shop windows or parked cars) for better observation.

-Enter buildings or make sudden, unexpected turns to test if a follower is maintaining their pursuit.

-While driving, change speeds, make sudden, unexpected turns to test if a follower is maintaining their pursuit. Make a stop at a safe location to observe if any vehicle stops nearby or behaves suspiciously. When you can, perform a legal and safe U-turn to see if the following vehicle replicates the maneuver. Drive a route in reverse or returning to a previous location to check for surveillance.

 

Counter-surveillance tactics for executive protection teams:

  • Behavior Analysis: EP team members have to learn how to observe the behavior of people in the vicinity of the protected individual. Look for signs of unusual or suspicious conduct, such as individuals who appear to be loitering, repeatedly changing their positions, taking a keen interest in the protected person, or other signs we mentioned earlier.
  • Varying Routes and Schedules: In our world, we say routine can be as deadly as a bullet, and there is a truth to it. EP teams must avoid predictable patterns by varying the routes and schedules of the protected individual. This makes it more challenging for potential threats to plan and execute an attack. And an additional challenge is that many clients become quite used to their patterns and it takes patience and understanding to slowly convince them that the day-to-day changes in routes or patterns are a good thing and not a bother or a hinderance.
  • Discreet and Safe Communication: It is disappointing to say that we have many examples of EP agents who do not practice secure and discreet communication methods, adding more risks to their client’s safety. Always maintain OPSEC, use secure communication apps (Sorry, but WhatsApp is NOT one of them), and be careful what you post on social media.
  • Counter-Observation: The majority of EP operations are done by small teams. Not all clients or teams have those extra bodies to deploy for their own counter-surveillance team. That is why it is important for the team members to be extra vigilant and keep an eye on individuals who may be surveilling the protected individual.
  • Technical Surveillance Detection: Use specialized equipment to detect electronic surveillance devices, such as hidden cameras, bugs, or GPS trackers. In addition, educate yourself and seek extra training in how to sweep vehicles, accommodations, and meeting locations for listening devices or threats.
  • Situational Awareness: Promote constant situational awareness among team members. Encourage them to be vigilant and observant of their surroundings, including people, vehicles, and anomalies.
  • Route Reconnaissance: Conduct advance reconnaissance of routes and locations where the protected individual will visit. Identify potential chokepoints, escape routes, and secure areas.
  • Spotting Surveillance Teams: Train team members to recognize signs of hostile surveillance teams. Look for vehicles or individuals that appear out of place, conduct frequent U-turns, or employ evasive driving tactics.
  • Emergency Response Protocols: Develop and rehearse with your team emergency response protocols to address situations where hostile surveillance is identified. These protocols should include contacting law enforcement, documentation, team briefings, and taking appropriate actions to ensure the principal’s safety.
  • Counter-Intelligence Measures: Be aware of potential leaks of sensitive information within the team, household personnel, or from external sources. Implement counter-intelligence measures to protect operational details.
  • Adaptive Tactics: Be always flexible and adapt tactics based on the specific circumstances and threat environment. Threats may change, so the counter-surveillance approach should evolve accordingly.

Do not forget the Human Element!

The human element is irreplaceable in counter-surveillance operations. Skilled and trained personnel with a deep understanding of human behavior and surveillance techniques are the linchpin of a successful counter-surveillance program. Their ability to blend in, remain discreet, and adapt to evolving threats is invaluable. Nothing can replace real-time-on-the ground intelligence.

For executive protection teams, counter surveillance is not really an option, it is an important component for protecting high-profile individuals, security team members and mitigating potential risks. By providing early threat detection, reducing vulnerabilities, preventing ambushes, enhancing situational awareness, and protecting privacy, counter surveillance serves as a vital pillar of executive protection operations.

#ExecutiveProtection #CounterSurveillance #SecurityTactics #RiskManagement

#ProtectiveOperations #SurveillanceCountermeasures #PersonalSafety #ThreatDetection

#VIPSecurity #ProtectionStrategies