Reminder December 2018 Private Security EP Operations Course

Registration Closes November 25th, 2018

Hosted by Ron Mann
www.DerechoInvestigations.com
Investigations@DerechoInvestigations.com

December 2018 Class Announcement
Private Security EP Operations
Law Enforcement Accredited
  (7 Days) (70+ hrs.)
 28 Learning objectives
9 Practical exercises
2 facilitated student-led operational exercises
2 live capstones


Faculty Information

Matthew C. Parker
Program Director
315-486-7854
mparker@inddps.com


Course Description; Private Security EP Operations

The NBA All-Star game and Republican National Convention is coming to Charlotte North Carolina. Are you prepared to operate in a multi-jurisdictional environment on private and public property and facilities alongside state and local law enforcement, the US Secret Service and the dozens of other private sector security providers?

Question: So you have done some executive protection before, but are you sure your ready to operate in this environment?   

If you have any question in your mind then this dignitary and executive protection course hosted and co-sponsored by Ron Mann and Derecho Investigations is for you and your team. Mr. Mann knowing the scope of operating in Charlotte and wanting to be sure his entire staff was ready and current with their training has gone the extra step of hosting a fully accredited and North Carolina approved Dignitary & Executive Protection Training Course.

Co-sponsored by the World Institute of Security Enhancement (WISE) and conducted by Independent Security Advisors LLC this program will have some of the most highly qualified guest speakers, instructors and cadre ever assembled.  This is fully accredited and pure executive protection training, no “shiny objects” like a day on the range or a day on the track.  Use of force and drivers training are stand-alone programs, we focus completely on the critical skills and procedures of conducting executive protection. (See course material below)


This course is designed to introduce the student, whether law enforcement, private security or investigators to the critical, basic and advanced foundations of Dignitary and Executive Protection.  The methodology and procedures are based on the US Secret Service concept of security in depth; this ensures students learn an established standard of conduct as well as operations, critical individual skillsets and procedures. But interoperability of private security and law enforcement is also a major component of this course.

This program will specifically address dignitary and executive protection operations and introduce students to the issues associated with the different security organizations, agencies, and departments when they are operating around and within each other’s “controlled space”, especially within the operational authority of the US Secret Service, state and local law enforcement.

The program standardizes procedures and skillsets to prepare students who will conduct or support dignitary/executive protective service operations for private clients, elected officials, and political appointees, members of the court and corporate executives who may be potential targets of terrorism and/or criminal acts.

Course History

Originally the introduction to EP operations course for local and campus law enforcement, this program was redesigned to bring private security organizations and law enforcement together under one standardized program of instruction. This course prepares students to provide close protective services at all levels of threat and in accordance with all applicable international, federal, state and local laws and regulations in a multi-jurisdictional environment or national security event. 


 Accreditations

 Virginia Department of Criminal Justice

 Course Title: Pre-Approved Alternative Training:  Personal Protection Specialist 32E
Approved:  12 -12-2014 to Current date

North Carolina & South Carolina: NC DPS: Private Protective Services Board

Course Number           Course Name  PPSB-16-109                 Dignitary & Executive Protection for Private Security
    BPN             Approved         Expiration        Credit Hours
008459P3        4/21/2016       4/21/2020       12.0 hours

Law enforcement in-service: Approved in Maryland; Virginia; Georgia; South Carolina & New Hampshire

Endorsed by the International Foundation of Protection Officers


Admission requirements

  1. Must be 18 years of age or older.
  2. Must be United States citizen or legal resident alien of the United States.
  3. Be of good moral character with temperate habits (no criminal record, etc.). Individuals convicted or found guilty of a felony or misdemeanor (not to include minor traffic violations) in North Carolina or any other jurisdiction to include military court-martial or currently under protective orders must contact the Private Protective Security Board for approval to attend.
  4. Members and former members of law enforcement must be in good standing with their respective agencies and departments
  5. Current security clearance or criminal background check, Contact us to initiate a criminal background check
  6. Valid state driver’s license
  7. No physical limitations that would affect a student’s ability to complete the capstone testing exercise.
  8. Military service members or veterans attending this program will need a current valid ID or if claiming veteran status a copy of the DD-214
  9. Recertification and In-service programs require evidence of prior close protection experience

Policy and Procedures on Affirmative Action, Equal Opportunity, and Sexual Harassment

Nondiscrimination: It is the policy of ISA and our partners that no student or employee of ISA may discriminate on the basis of race, religion, color, creed, sex (including sexual harassment), marital status, age, national origin, political affiliation, mental or physical disability, or sexual orientation. Individuals who believe they have been discriminated against because of any factor protected under this policy may file a complaint of discrimination.

Students with Disabilities

The Americans with Disabilities Act (ADA) prohibits discrimination based on disability and requires the College to be physically and programmatically accessible. As required by section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act of 1990, reasonable accommodations are provided to ensure equal opportunity for students with verified disabilities. 


Conduct of Training

This program is governed by the August 10, 2015, Virginia regulation 6VAC20-173-170. Private Security Services Training Session.

Training sessions will be conducted in accordance with the requirements established in this chapter. Adherence to the administrative requirements, attendance, and standards of conduct are the responsibility of the training school, training school director, and instructor of the training session.

Course Outline

ISA Outline Description

Students will explore, discuss and demonstrate the skill sets, procedures, and techniques required to provide protection to a designated principal/protectee as part of a protective service detail.  The understanding of protective operations students develop through this course will enable them to operate as part of a protective service organization or to support those operations.

 Training Pillar 1 Threat Assessments                         10hrs

Training Pillar II Advance Work                                  10hrs

Training Pillar III Mission Planning                            10hrs

Training Pillar IIII Conduct Operations                      10hrs

Training Pillar IV Multi-Jurisdictional Operations  10hrs

ISA Curriculum Design

Course materials, methodology, topics of study and evaluation standards were voluntarily submitted for review and objective assessment to former instructors and course managers from the Federal Law Enforcement Training Centers, the US Army Protective Service Training Course and the United States Secret Service. All ISA courses are in compliance with applicable laws and regulations and found to follow the current doctrine and training standards of each of the training academies.

Daily Training Policy

Instruction shall be provided in no less than 50-minute classes.

Training sessions shall not exceed nine hours of classroom instruction per day. Range qualification and practical exercises shall not be considered classroom instruction; however, total training, including the maximum allotment of nine hours classroom instruction and applicable range qualification and practical exercises, shall not exceed 12 hours per day. This does not include time allotted for breaks, meals, and testing.

All audiovisual training aids must be accompanied by a period of instruction where the instructor reviews the content of the presentation and the students are provided the opportunity to ask questions regarding the content.


Training Materials 

1. Students will be issued a tablet for coursework but are encouraged to bring their laptop or tablet with Microsoft Office, PDF reader and media player installed

2. Students will need to open a temporary GMAIL account and have a working knowledge of Google play https://play.google.com/store/apps?hl=en

3. Laptops and printers will be available for group projects, research and preparing briefings.

Course Books

DHS, PSOTP Handout Book

Federal Law Enforcement Training Center Protective Operations quick reference guide

FBI Intelligence Requirements and Threat Assessment

FBI, Threat Assessment: Defining an Approach for Evaluating Risk of Targeted Violence

Executive Protection Handbook

ISA Study Guide

 Restricted references for L.E. and military students only Unless Declassified

US Dept. of State Diplomatic Security Guide

AR 190-58 Dept. of the Army Personal Security

FM 3-19.12 Dept. of the Army Protective Services Manual

Clearance Access

Restricted to cleared personnel only

Foreign Disclosure Restrictions       

This product/publication has been reviewed and has been determined to be available in open source media. As such this product is releasable to students from foreign countries.

Restrictions: Military field manuals, regulations and other references covered by release restrictions will not be used by personal unapproved for access.

 

Schedule

The course will normally follow the sequence outlined below-

Phase I- Distance Learning (Online)

DLTLO 1 – Describe the BASIC legal concerns, restrictions and jurisdictional issues faced by a protective detail or agent

o ELO 1- Licensing

o ELO 2- Training requirements

o ELO 3- Legal restrictions and liability

o ELO 4- Authority to protect, jeopardy and self defense

o ELO 5- Use of force

o ELO 6- Weapons and concealed carry

o ELO 7- Legal protections, limitations and requirements as set forth under the US Constitution (Amendments

o ELO 8- Cooperation with Local Law Enforcement

o ELO 9- Prevention of legal issues and suits

 DLTLO 2- Identify the BASIC duties and responsibilities of a protective agent currently

o ELO 1- What are the normal duties of an protective agent today

o ELO 2- What specialized duties may be assigned to agents today

o ELO 3- What is the agent’s professional responsibility to the detail and the protectee

 DLTLO 3- Identify the BASIC duties, objectives, role, and responsibilities of a close protection team

o ELO 1- What is the role and responsibilities of a close protection team?

o ELO 2- What are some of the standard policies and procedures or SOP’s of the protective detail?

o ELO 3- What are the team leader selection considerations?

 DLTLO 4- Identify the BASIC duties, objectives, role, and responsibilities of a single agent detail

o ELO 1- What are the role and daily duties and responsibilities for the agent on a single person detail?

o ELO 2- What is the objective of single agent detail?

o ELO 3- Basic operational procedures for the single agent

 DLTLO 5- Describe the BASIC standards of dress, conduct, protocol and etiquette for the protective service agent

o ELO 1- Discuss the proper dress for a protective agent

o ELO 2- Discuss the proper / improper conduct of a protective agent

o ELO 3- Understand the importance and basics of protocol and etiquette

 

Phase II- Resident Phase

Day 1- Overview of the Basics of Working as a Close Protection Operative

TLO 1- Discuss the basic philosophy, mission, and objectives for a protective service detail

o ELO 1- What is the primary mission of the protective detail?

o ELO 2- What are the four objectives for the protective detail?

o ELO 3- What are the reasons and justification for providing protection?

o ELO 4- The difference between a client and a principal and their role in the close protection operation

TLO 2- Define the threat

o ELO 1- Define the threat; Physical VS. Non Physical, Lethal vs. Non-lethal

o ELO 2- The Human factor of a threat assessment; The emotional  VS. Intellectual dilemma

o ELO 3- What are historically the emotional and intellectual triggers for past threats or acts of violence?

o ELO 4- What are the different threats and methods of attack on a protectee today

o ELO 5- An intelligence threat briefing

TLO 3- Define and describe the purpose and critical importance of the threat assessment

o ELO 1- What is a threat assessment

o ELO 2- What is the purpose of a threat assessment

o ELO 3- What are the types of threat assessments

TLO 4- Demonstrate how to perform threat intelligence procedures during the threat assessment process

o ELO 1- HUMIT, interviewing, and analysis

o ELO 2- What is the dark web

o ELO 3- Open source proactive intelligence, Blogs, newsletters, and web joining

o ELO 4- SIGNIT, The legality’s of conducting intelligence-gathering by intercepting communications between people

o ELO 5- How to use handwriting, psychological and other specialists for analysis of threat potential

o ELO 6- How to identify hostile media and those with a negative or harmful agenda

TLO 5- Demonstrate how to use the threat assessment process to complete a threat assessment packet and identify the resources and equipment needed to address the given threat to a protected individual or organization

o ELO 1- What is the Threat Assessment Process

o ELO 2- How to prepare a threat assessment packet

o ELO 3- How to use the threat assessment packet to identify the threats faced by the protectee and or the organization

o ELO 4- How to build a threat profile of an organization or individual

TLO 6- Describe how legal concerns, restrictions and jurisdictional issues are affected by the threat assessment

o ELO 1- Licensing

o ELO 2- Training requirements (Accreditations / Certifications)

o ELO 3- Legal restrictions and liability

o ELO 4- Authority to protect, jeopardy and self defense

o ELO 5- Use of force

o ELO 6- Weapons and concealed carry

o ELO 7- Cooperation with Local Law Enforcement

TLO 7- identify how the threat assessment affects the duties and responsibilities of a protective agent

o ELO 1- How do the duties of an protective agent change with the threat assessment

o ELO 2- What specialized duties may be assigned to an agent with a change in the threat assessment

TLO 8- Identify how the duties, objectives, role and responsibilities of a close protection team is affected by changes in the threat assessment

o ELO 1- How does the role and responsibilities of a close protection team change with the threat assessment?

o ELO 2- How are the policies and procedures or SOP’s of the protective detail affected by the threat assessment?

o ELO 3- How is the team leader selection process affected by the threat assessment?

TLO 9- How are the duties, objectives, role, and responsibilities of a single agent detail affected by the threat assessment

o ELO 1- How does the role and daily duties and responsibilities of the agent on a single person detail change with the threat assessment?

o ELO 2- How do the objectives and operational procedures for the single agent change with the threat assessment?

TLO 10- Describe how the standards of dress, conduct, protocol, and etiquette are affected by the threat assessment

o ELO 1- How is the selection of attire (look / presentation) affected by the threat assessment?

o ELO 2- How is the conduct of an agent determined by the threat assessment?

o ELO 3- How are protocol and etiquette affected by the threat assessment?

 

Day 2- Operational Mission Planning

TLO 11- Discuss operational planning factors and mission planning based on the threat assessment

o ELO 1- Protective Service Operations Planning Procedures

o ELO 2- What is proactive planning?

o ELO 3- What are the pros and cons of proactive planning?

o ELO 4- What is reactive planning?

o ELO 5- What are the pros and cons of reactive planning?

o ELO 6- How to use mobile IT such as cell phones, tablets and application programs to enhance operational capabilities

o ELO 7- How to successfully work with Law enforcement and the media

 TLO 12- Conduct an overview of the philosophy of protection and operational procedures based on the threat assessment

o ELO 1- What are the three cordons of security?

o ELO 2- Physical VS. Personal protection measures

o ELO 3- How to determine the operational procedures and tactics required based on the threat assessment

  • ELO 4- Discuss how to operate within the cordons of security as established by a higher authority

TLO 13- Discuss the principles, techniques, and standards for physical security

o ELO 1- What is physical security

o ELO 2- What is a physical security inspection

o ELO 3- What are Force Protection Conditions (FPCON)

o ELO 4- What are Force Protection measures

o ELO 5- What systems and common physical security hardware in presently in use?

o ELO 6- How to prepare a physical security plan based on the threat assessment

  • ELO 7- Discuss how to implement an physical security plan within the operational area of a higher authority

TLO 14- Identify the purpose, roles and responsibilities of the advance team

o ELO 1- What is the purpose and mission of the advance team?

o ELO 2- How does the advance team factor into the overall mission planning process

o ELO 3- What are the responsibilities’ and challenges for the advance team

TLO 15- Demonstrate how to conduct an advance and prepare the different types of security surveys and briefings

o ELO 1- What is the mission notice and the importance of the itinerary

o ELO 2- What are the different types of surveys and survey techniques?

o ELO 3- How to prepare a route analysis/ route selection

o ELO 4- How to prepare a transportation plan

o ELO 5- How to conduct a detailed advance and site survey

o ELO 6- How to conduct a physical security inspection

o ELO 7- How to use security force multiplier, strengths, and weaknesses of each

o ELO 8- How to prepare a communications, TSCM, K-9, CS/SD, medical and evacuation plan

o ELO 9- How to prepare an interior/exterior movement plan

o ELO 10- How to select arrival and departure location

o ELO 11- How to prepare the staging area

o ELO 12- How to plan arrival and departures to include agent placement, vehicle placement, formations, communication procedures and techniques

o ELO 13- How to prepare and present an advance briefing

  • ELO 14– Discuss how to complete advance and site survey operations within the operational area of a higher authority

TLO 16- Discuss how to plan and emplace security measures around the protectee based on the threat assessment

o ELO 1- How to use the threat assessment and advance report to determine resources required to address the threat

o ELO 2- How to prepare resource request based on the threat assessment

 

Day 3- Standard Close Protective Operational Procedures

TLO 17- Demonstrate the principles, techniques, and standards of arrival and departure procedures

o ELO 1- Agent placement

o ELO 2- Vehicle placement

o ELO 3- Formations

o ELO 4- Communication procedures and techniques

  • ELO 5- Discuss how to conduct arrival and departure procedures within the operational area of a higher authority

TLO 18- Identify the principles, techniques, and standards for dismounted movement formations and technique based on the threat

o ELO 1- What are the different types of formations?

o ELO 2- Proper transition procedures from vehicles to fixed sites

o ELO 3- Proper foot movement techniques to include formations, team communication procedures and techniques

  • ELO 4- Discuss how to conduct dismounted movement procedures within the operational area of a higher authority

TLO 19- Identify the principles, techniques and standards of attack on principal drills and cover or evacuation decision making

o ELO 1- Attack on principle procedures and drill, what is the Tueller Drill?

o ELO 2- What is the 3 foot reactionary gap and arms reach principle

o ELO 3- What is the evacuation decision making process

  • ELO 4- Discuss how to conduct cover or evacuation procedures within the operational area of a higher authority

TLO 20- Identify the principles, techniques and standards of De-escalation techniques

o ELO 1- Negotiation skills, the need for being assertive

o ELO 2- Non-Lethal Technologies

o ELO 3- How to bypass, use diversion and the redirect decision making process to avoid conflict

 

Day 4- Close Protective Operational Procedures Evaluation

TLO 21- Demonstrate how to plan and emplace security measures around the protectee

o ELO 1- Emplace the three cordons of security

o ELO 2- Demonstrate the philosophy of protection in-depth and how it works with the threat assessment

o ELO 3- What are common scenarios or situations with an demonstrated elevated threat, or history of attacks

o ELO 4- Discuss and wargame the different scenarios and considerations that affect the security plan

TLO 22- Discuss and analyze case studies of historical incidents and surveillance operations against a protectee

o ELO 1- What is the cycle of attack?

o ELO 2- What surveillance measures are commonly used to determine target viability

  • ELO 3- What measures can the detail use to disrupt the planning cycle
  • ELO 4- Prepare a case study and after action report of a historical incident

 

Day 5- Capstone and Evaluation

TLO 23- Describe the interpersonal and demographic evolution of a protective service detail

o ELO 1- What is Interpersonal Communication

o ELO 2- What is Interpersonal trust

o ELO 3- What are interpersonal skills

TLO 24- Describe the methods and procedures to establish a working and trusted relationship with your protectee and others

o ELO 1- The critical need for building an rapport and effective Interpersonal communication with those we protect

o ELO 2- Building trust and a dependent relationship with our protectee

TLO 25- Describe the ethical and moral considerations and decisions that may have an effect on your career

o ELO 1- What are “ethical dilemmas” and how do we form an ethical bias

o ELO 2- What is a moral code?

o ELO 3- Identify your moral and ethical limits as established from your upbringing and respect for the law

o ELO 4- Discuss the standards of ethical and moral behavior

TLO 26- Demonstrate proper execution and or understanding of common detail tasks preparing for and during protective operations

o Evaluation Exercise will consist of the following-

 Threat Assessment Procedures; Proper Risk Mitigation Planning; Proper Resource Management; Mission Planning; React to protectee itinerary change; React to operations plan change; Protective Operations Command and Control; React to mechanical breakdown; React to medical emergency; React to loss of communication and accountability of team members; React to loss of team members; React to increase to threat assessment; Conduct arrival and departure procedures; Conduct meeting or event; React to surveillance; React to non-lethal or embarrassment scenario; React to hostile crowd; React to lethal scenario; Team leader decision making process

Day 6- Field Operations

TLO 27- Conduct field operations

o ELO 1- Discuss the threats and use of drones in EP operations

o ELO 2- Discuss and demonstrate the use and limitations of the motorcade

o ELO 3- Discuss and demonstrate counter-surveillance planning and operations

o ELO 4- Discuss and demonstrate the strengths and limitations of current communication measures

o ELO 5- Discuss and demonstrate the command and control limitations of a modern EP operation

Day 7- Capstone and Evaluation

TLO 28- Demonstrate the ability to conduct daily operations as part of a protective service detail

o Pre-mission briefings and rehearsals

o Proper manning requirements and positioning of agents, advance, escort, emergency

o Shift change procedures

o Schedule changes and last minute adjustments

o Static post procedures

o Mobile post procedures, crowd & event security, press conference, tours, and unplanned movements

 

Practical Exercises

Throughout the resident phase of the course, students will be expected to demonstrate their mastery of the material through a series of discussions and hands on practical exercises

Practical Exercise 1- Given an ethical and moral dilemma discuss the considerations and decisions that you as an agent may have to make during your career.

 The ethical and moral beliefs of your protectee may not be the same as the agents

 The upbringing of the agent can and will have a direct impact on their ability to serve on a detail and work for some people

 

Practical Exercise 2- Instructor led the preparation of a threat assessment packet

 Importance of Demographic/Biographical information of the protectee

 How to use the threat determination matrix to determine threat levels

 How to use the threat source template to determine the likely location of a threat/attack

 

Practical Exercise 3- Students prepare a threat assessment packet

 Importance of Demographic/Biographical information of the protectee

 How to use the threat determination matrix to determine threat levels

 How to use the threat source template to determine the likely location of a threat/attack

 

Practical Exercise 4- Demonstrate how to use open source intelligence and social media to build a threat assessment profile on a suspected person or organization

 Determine motive and previous operational methods and trends of a suspected person or organization

 Determine procedures and methods to counter the threat

 

Practical Exercise 5- Prepare a resources cost benefit analysis and budget request based on the threat assessment

 Manpower costs

 One-time expenses

 Recurring expenses

 IRS and insurance regulations

 

Practical Exercise 6-Instructor led demonstration a simple advance of a building

 Route planning to site

 Arrival plan, parking plan

 Entrance plan, entrance inspection

 Interior movement plan, green room, rest rooms, communication, evacuation

 Site security plan

 Departure plan

 

Practical Exercise 7- Student team led, conduct an advance and site survey of an assigned location

 Threat assessment

 Transportation plan & Communication plan

 Route selection and recon

 Medical response plan

 Arrival & Departure plan

 Event security planning

 Physical security plan

 Prepare a mission briefing

 

Practical Exercise 8- Student team led, complete an advance and site survey report of an assigned location, prepare a physical security plan for a residence, commercial location or industrial complex complete and give operational briefing;

 Threat assessment

 Access control

 Parking and off site security measures

 Transportation plan

 Communication plan

 Route selection and emergency procedures

 Medical response plan

 Arrival plan

 Event security planning and emergency procedures

 Physical security plan

 Media plan

 Departure plan

 Conduct a mission briefing

 

Practical Exercise 9- Conduct arrival and dismounted movement drills with a react to attack/emergency scenario

 Proper formation selection; Proper agent placement; Proper agent communications

 Proper arrival procedures; Proper dismounted movement

Please follow and like us:
%d bloggers like this: