News

Get your free quote today

Get a Free quote

Exploring the key strategies and tactics used to protect high-profile figures in the UK.

 

High-profile figures face a myriad of potential threats that necessitate a robust and detailed approach to personal security. Whether these individuals are political leaders, celebrities, or corporate executives, their prominence requires highly skilled, specialist protection.

The attack on Ex-President Donald Trump at a rally in Pennsylvania last weekend highlighted how essential Close Protection services are in responding swiftly and effectively to threats. Despite media portrayals suggesting shortcomings in the Secret Service’s response, it is essential to understand that threat assessments and protection strategies are complex and multifaceted. This article delves into the essential aspects of Close Protection in the UK, highlighting the principles, threat assessment processes, and the categorisation of threat levels.

Concentric Rings of Protection

The primary function of a Close Protection team is to establish concentric rings of protection around the person being protected, known as the Principal. This layered approach involves a combination of physical and electronic security measures, supported by highly trained personnel.

 

Here are examples of these layers:

 

Outer Layer

  • Advance Team: Security personnel who survey the location ahead of time, identifying potential threats and securing the area.
  • Perimeter Security: Physical barriers like fences, gates, and security checkpoints to control access to the venue.
  • Surveillance: Use of CCTV cameras and monitoring systems to observe and track movements around the protected area.

 

Middle Layer

  • Security Personnel: Uniformed or plainclothes guards positioned strategically around the Principal to monitor and respond to any immediate threats.
  • Controlled Access Points: Limited and monitored entry points where credentials are checked, and visitors are screened.
  • Vehicle Barriers: Use of bollards, barricades, or secure parking areas to prevent unauthorised vehicle access.

 

Inner Layer

  • Close Protection Officers: Personal protection operatives who remain in close proximity to the Principal, ready to intervene in case of an immediate threat.
  • Escape Routes: Pre-planned and rehearsed evacuation paths to quickly remove the Principal from danger.
  • Personal Protective Equipment: Use of protective ballistic body armour, armoured vehicles, and other protective gear for the Principal.

 

Technological Measures

  • Electronic Countermeasures: Devices to detect and neutralise electronic eavesdropping or tracking devices.
  • Communication Systems: Secure and encrypted communication channels for the Close Protection team to coordinate effectively.
  • Alarm Systems: Intrusion detection systems that alert security personnel to breaches.

 

The goal is to create multiple barriers between the Principal and potential threats, thereby maintaining their safety and security at all times. This strategy ensures that even if one layer of protection is breached, additional layers remain intact to thwart any further attempts at harm.

Basic Principles of Close Protection

Effective Close Protection adheres to several foundational principles designed to mitigate risks and respond efficiently to threats. These principles are:

 

Remove or Reduce the Threat – Proactively identifying and neutralising potential threats before they materialise is crucial. This involves continuous monitoring and analysis of the environment and individuals who may pose a risk to the Principal.

 

Remove the Principal from the Source of Threat – In situations where a threat cannot be neutralised, the priority shifts to safely extricating the Principal from the danger zone. This could involve rapid evacuation procedures or altering the Principal’s route to avoid potential hazards.

 

Deploy Protection Assets – Positioning protection assets between the threat and the Principal serves as both a deterrent and a reactive measure. This includes the strategic placement of security personnel and the use of protective vehicles and equipment.

Detailed Threat and Risk Assessment

A thorough threat and risk assessment is absolutely essential to effective Close Protection. This process involves analysing various factors to determine the level of risk and develop appropriate security measures.

 

The assessment focuses on four key questions:

 

WHO? Identifying the Principal and understanding their role, significance, and the nature of threats they might face.
WHAT? Determining the specific threats the Principal is vulnerable to, such as physical attacks, kidnapping, or cyber threats.
WHERE? Establishing the locations where the Principal requires protection, including their home, workplace, and public appearances.
WHY? Understanding the reasons behind the need for protection, which helps in tailoring the security measures to the Principal’s specific circumstances.

The 7 P’s of Threat Profiling

Prior to any Close Protection operation, a detailed client profile is conducted to formulate contingency plans. This involves an in-depth analysis based on the 7 P’s of threat profiling:

 

  1. People – Assessing the individuals associated with the Principal, including family members, friends, and colleagues, to identify any potential security risks.
  2. Places – Analysing the locations frequently visited by the Principal to determine vulnerability points and necessary security measures.
  3. Personality – Understanding the Principal’s personality traits, such as their risk tolerance and behaviour under stress, to tailor the protection strategy.
  4. Personal History – Reviewing the Principal’s background to identify any historical threats or patterns that could inform the current security approach.
  5. Private Lifestyle – Examining the Principal’s private life, including their routines and habits, to anticipate potential risks.
  6. Prejudices – Identifying any prejudices or biases the Principal may have that could make them a target.
  7. Political and Religious Views – Considering the Principal’s political and religious affiliations, as these can significantly influence the nature of threats they face.

Categorisation of Threat and Protection Levels

Once the threat profile is established, the Principal’s risk level is categorised to determine the appropriate level of protection.

 

These categories are:

Category 1 (High Risk): Individuals in considerable danger with a high likelihood of an attack, such as political figures like Kier Starmer, President Donald Trump, or Volodymyr Zelensky. This category requires the most stringent security measures and constant vigilance.

Category 2 (Medium Risk): Individuals in some danger due to their circumstances, where an attack cannot be entirely ruled out. This category still requires robust protection but with a slightly lower intensity than Category 1.

Category 3 (Low Risk): Individuals who may be in danger but for whom an attack is only a possibility. Protection measures are less intensive but still comprehensive.

Key Considerations After Establishing Threat Levels

Once the threat level has been established, several factors must be considered, including the threat category, the status and wishes of the Principal, and the available resources. The provision thereafter would concentrate on the following:

 

Access Control – Controlling access to the Principal’s residence, public meetings, engagements, and place of work.
Security of Travel and Journey Management – Ensuring the Principal’s safe travel and managing their journeys to minimise risk.

 

Screening Individuals and Venues – Searching individuals meeting the Principal and securing venues where they will be present.

 

Maintaining Concentric Rings of Protection – Using a Personal Protection Officer, combined with a Personal Escort team and providing protective surveillance and counter-surveillance while the Principal is out and about.

 

Sanitising and Securing Vehicles and Venues: Ensuring the security integrity of all vehicles associated with the Principal, as well as their residences, hotels, office spaces, and other venues, keeping them sanitised and secure.

 

Residential Security Team – Depending on the threat category, setting up a Residential Security Team to protect the Principal while they are at home.

Challenges of Close Protection in the UK

In the UK, Close Protection operatives licensed by the Security Industry Authority (SIA) face specific challenges. Notably, these operatives are unarmed, which limits their ability to counter threats involving firearms, bladed weapons, or acid attacks effectively. This necessitates a greater emphasis on proactive threat identification, advanced planning, and the use of non-lethal defensive measures. It also underscores the importance of having highly trained personnel capable of handling a wide range of scenarios without relying on firearms.

Effective Close Protection

Providing Close Protection for high-profile figures in the UK is a complex and demanding task that requires a detailed understanding of potential threats, meticulous planning, and the deployment of well-trained security personnel. Close Protection services, which involve creating concentric rings of protection and adhering to fundamental security principles, ensure that Principals receive the highest level of safety and security. By conducting thorough threat assessments and categorising risk levels, Close Protection teams tailor their protective measures to meet the requirements of each Principal, ensuring their safety in an unpredictable world.

Contact us

For more information on our expert Close Protection services or to discuss your specific security needs, contact Graspan Frankton today. Our team of professionals is ready to secure your safety and peace of mind.

Enquire today

Click the link below to contact us today

Enquire Now

CALL US NOW
(0)191 466 1176

Can’t speak right now?
Request a callback...

    © Copyright 2024 Graspan Frankton Ltd


    Policies