DIGNITARY PROTECTION SEMINAR
SYLLABUS
Introduction
Staff and participants meet one another. Participants receive an overview of the seminar and the objectives to be accomplished. All administrative matters are completed.
Case Studies in Assassinations and Near Lethal Attacks
This block of instruction provides an in-depth examination of assassinations and near-lethal attacks on high profile individuals (U.S. presidents, presidential candidates, foreign dignitaries) to assess protective service failures and how protective service methodology evolved from lessons learned.
Introduction to Protective Service Principles
Students examine the concept of layering protection, and the elements of each layer when establishing a protective service operation.
Threat Assessment and Protective Intelligence
The threat assessment underpins and drives the scope of the protective detail. Students learn how threat assessment is conducted, the different types of threats that may occur, how to evaluate threat data and mitigate risk, as well as identifying sources of threats. Moreover, participants learn the key elements to a protective intelligence strategy and methods to counter adverse intelligence.
Surveillance and Counter Surveillance
This course provides the student with an in-depth understanding of hostile surveillance and the various methods assailants use to observe a target. The student examines the phases of the criminal attack cycle and identifies vulnerabilities at critical stages to preempt an attack. Further, students learn the principles of counter surveillance, including situational awareness skills to detect surveillance tradecraft, and mechanisms to ferret out suspected observers.
Operational Planning
Operational planning is the key to mission success. Students learn the purpose of formulating an operational plan and key elements comprising an effective operational plan. Participants will devise an operational plan and present it in class.
Operational Security
Operational security (OPSEC) pertains to protecting information that is critical, but not classified. Sometimes referred to as “friendly” information, disclosure of critical information may threaten the security of the Protectee and the protective services operation. This course provides students with fundamental principles of operational security and how to protect unclassified information. A tabletop exercise is applied to this module.
Detail Organization
Students learn the organization of a protective services detail; the various positions and each member’s role and responsibility in foot and motorcade formation. The course also discusses other protective security support, such as EOD, canine, command post, counter surveillance teams, and protective intelligence teams, among others.
Advances and Site Surveys
Advances and site surveys are comprehensive written plans, formulated prior to commencement of a detail, to proactively mitigate risk to the Protectee. Participants learn the duties and responsibilities of an Advance Officer, how to conduct a thorough advance, gather intelligence to assess the security situation, identify potential threats, and recommend countermeasures to eliminate problems. The course provides students with site survey templates to be used when conducting advances in such venues as hotels and airports, among others. Moreover, students receive training in preparing route surveys, charting and mapping primary and secondary routes, identifying chokepoints, and establishing safe havens and check points. Finally, this block of instruction includes a practical exercise where students advance a location and prepare a written site survey for presentation to the class.
Vulnerability Assessments
A vulnerability assessment is a component of an advance/site survey that targets an aspect of a venue or route deemed as the most probable location for an attack to occur. Students learn the methodology of vulnerability assessments, how to conduct an assessment, interpret vulnerability using a matrix (criterion), and format the assessment using a template provided by the course. Students will conduct and prepare a vulnerability assessment for presentation to the class.
Foot Formations
This course provides the student with an in-depth understanding of the various foot formations used in a protective service operation. The training focuses on the role and responsibility of each position in the formation, working the Protectee, and responding to verbal and physical assaults. Furthermore, students learn how to cover the Protectee in potentially hazardous environments, such as hostile crowds, fence lines or receiving lines, and tactics used in response to imminent danger.
Foot Formations Lab
This block of instruction includes a practical exercise where students assemble into various foot formations, work the Protectee in different environments, such as through crowds, and apply the principles learned in the course to respond to threats or attacks.
Motorcade Operations
Participants learn various motorcade formations; the positions within the motorcade and corresponding responsibilities; driving in vehicular formations; maneuvering the motorcade through traffic conditions while protecting the Limo; and motorcade arrivals and departures.
Arrivals and Departures
Motorcade arrivals and departures are two critical chokepoints in any protective operation. Students learn key industry practices governing security at chokepoints; determining vulnerabilities and mitigating risk; and applying techniques in the event of an emergency or an attack.
Motorcade Operations Lab
Students participate in a static motorcade exercise to practice arrivals and departures. Students perform designated roles in the motorcade, deploy from the vehicles to their area of responsibility, and assemble in foot formation once the Protectee exits the Limo (arrival). Students also practice escorting the Protectee from the venue to the motorcade, and recovering their respective positions within the motorcade vehicles (departure). Emphasis is placed on the choreography of movement between detail members.
Ambush Recognition and Escape and Evade Tactics
The training incorporates anti-ambush principles; recognizing a potential attack; and tactical response to an organized ambush. Moreover, students learn effective escape and evade driving in the event of an attack or other emergency, such as an incapacitated driver or vehicle.
EPS 2014
SYLLABUS
Introduction
Staff and participants meet one another. Participants receive an overview of the seminar and the objectives to be accomplished. All administrative matters are completed.
Case Studies in Assassinations and Near Lethal Attacks
This block of instruction provides an in-depth examination of assassinations and near-lethal attacks on high profile individuals (U.S. presidents, presidential candidates, foreign dignitaries) to assess protective service failures and how protective service methodology evolved from lessons learned.
Introduction to Protective Service Principles
Students examine the concept of layering protection, and the elements of each layer when establishing a protective service operation.
Threat Assessment and Protective Intelligence
The threat assessment underpins and drives the scope of the protective detail. Students learn how threat assessment is conducted, the different types of threats that may occur, how to evaluate threat data and mitigate risk, as well as identifying sources of threats. Moreover, participants learn the key elements to a protective intelligence strategy and methods to counter adverse intelligence.
Surveillance and Counter Surveillance
This course provides the student with an in-depth understanding of hostile surveillance and the various methods assailants use to observe a target. The student examines the phases of the criminal attack cycle and identifies vulnerabilities at critical stages to preempt an attack. Further, students learn the principles of counter surveillance, including situational awareness skills to detect surveillance tradecraft, and mechanisms to ferret out suspected observers.
Operational Planning
Operational planning is the key to mission success. Students learn the purpose of formulating an operational plan and key elements comprising an effective operational plan. Participants will devise an operational plan and present it in class.
Operational Security
Operational security (OPSEC) pertains to protecting information that is critical, but not classified. Sometimes referred to as “friendly” information, disclosure of critical information may threaten the security of the Protectee and the protective services operation. This course provides students with fundamental principles of operational security and how to protect unclassified information. A tabletop exercise is applied to this module.
Detail Organization
Students learn the organization of a protective services detail; the various positions and each member’s role and responsibility in foot and motorcade formation. The course also discusses other protective security support, such as EOD, canine, command post, counter surveillance teams, and protective intelligence teams, among others.
Advances and Site Surveys
Advances and site surveys are comprehensive written plans, formulated prior to commencement of a detail, to proactively mitigate risk to the Protectee. Participants learn the duties and responsibilities of an Advance Officer, how to conduct a thorough advance, gather intelligence to assess the security situation, identify potential threats, and recommend countermeasures to eliminate problems. The course provides students with site survey templates to be used when conducting advances in such venues as hotels and airports, among others. Moreover, students receive training in preparing route surveys, charting and mapping primary and secondary routes, identifying chokepoints, and establishing safe havens and check points. Finally, this block of instruction includes a practical exercise where students advance a location and prepare a written site survey for presentation to the class.
Vulnerability Assessments
A vulnerability assessment is a component of an advance/site survey that targets an aspect of a venue or route deemed as the most probable location for an attack to occur. Students learn the methodology of vulnerability assessments, how to conduct an assessment, interpret vulnerability using a matrix (criterion), and format the assessment using a template provided by the course. Students will conduct and prepare a vulnerability assessment for presentation to the class.
Foot Formations
This course provides the student with an in-depth understanding of the various foot formations used in a protective service operation. The training focuses on the role and responsibility of each position in the formation, working the Protectee, and responding to verbal and physical assaults. Furthermore, students learn how to cover the Protectee in potentially hazardous environments, such as hostile crowds, fence lines or receiving lines, and tactics used in response to imminent danger.
Foot Formations Lab
This block of instruction includes a practical exercise where students assemble into various foot formations, work the Protectee in different environments, such as through crowds, and apply the principles learned in the course to respond to threats or attacks.
Motorcade Operations
Participants learn various motorcade formations; the positions within the motorcade and corresponding responsibilities; driving in vehicular formations; maneuvering the motorcade through traffic conditions while protecting the Limo; and motorcade arrivals and departures.
Arrivals and Departures
Motorcade arrivals and departures are two critical chokepoints in any protective operation. Students learn key industry practices governing security at chokepoints; determining vulnerabilities and mitigating risk; and applying techniques in the event of an emergency or an attack.
Motorcade Operations Lab
Students participate in a static motorcade exercise to practice arrivals and departures. Students perform designated roles in the motorcade, deploy from the vehicles to their area of responsibility, and assemble in foot formation once the Protectee exits the Limo (arrival). Students also practice escorting the Protectee from the venue to the motorcade, and recovering their respective positions within the motorcade vehicles (departure). Emphasis is placed on the choreography of movement between detail members.
Ambush Recognition and Escape and Evade Tactics
The training incorporates anti-ambush principles; recognizing a potential attack; and tactical response to an organized ambush. Moreover, students learn effective escape and evade driving in the event of an attack or other emergency, such as an incapacitated driver or vehicle.
EPS 2014
Advanced Law Enforcement Readiness Training © Copyright 2022
Telephone 877-550-1004