Leads

The Importance of Executive Protection

Kidnapping, terrorizing, and assault are not in the job description for executives at large corporations. Unfortunately, these crimes are sometimes perpetrated against individuals with money and visibility. Because of this, we live in an age where corporations spend money to protect their top executives. It has become more important now than ever to ensure safety with private protection agencies.
Forbes recently announced some staggering figures. They discovered that large corporations such as Oracle and Google were paying top dollar for the protection of their executives. Oracle spent about $1.8 million in a year protecting their CEO. Google was a little thriftier, spending only about a half a million dollars. Major companies are obviously discovering that the safety and welfare of their top brass is an important part of doing business.

Some executives are in more danger than others, however. While Google CEO Eric Schmidt is worth a lot of money, other executives are the subject of more scrutiny. For instance Schering-Plough CEO Fred Hassan has received numerous threats from animal rights activists for his company's involvement in animal testing. Other executives take their business to remote locations where protection can become a necessity. When corporate leaders visit countries like Guatemala, they often hire protection to ensure safe travels.

All of the money spent on executive protection can pay for itself when it prevents just one major mishap. Attacks on executives not only cause human suffering, they also drive down stock prices and destabilize company leadership. A single kidnapping or robbery can cost up to tens of millions of dollars. This number can be inflated by court, legal, and medical costs. Spending just a fraction of this to prevent such an instance is becoming a more common choice for major industry leaders.
Many executive teams are turning to private companies to provide the protection they need. Sophisticated means are employed by these specialized teams. However, it is not uncommon for corporate leaders to travel with an executive bodyguard who can provide immediate security and assistance in dangerous times

Before Guarding A Celebrity

Celebrity bodyguards get the best of their client’s world. Working for the stars allows him or her an almost-equal treatment with bountiful compensation and perks on the side. But if you think that a bodyguard’s job is as glamorous as the celebrities they protect, think again. For one, it is not an 8-hour job nor it is a shifting schedule. Yes, bodyguards have a day-off, but having an A-list client, you go where they go.
And would you be wondering how someone becomes a bodyguard for a celebrity? Before you become one, it will take a lot of effort — from training to understanding that, on given circumstances, you’ll have to lay yourself on the line of duty and take a bullet for them.

Before you become a certified (and insured) bodyguard for the rich and famous personalities neither a celebrity, a corporate executive, or a dignitary, it is required that you undergo a very rigorous training from firearms, unarmed combat, tactical driving or defensive driving to first aid training. And as a protective escort especially on high-profile clientele, the training is extended to crowd screening and control, threat or risk assessment, explosive search, electronic surveillance devices or bugs search, and on frequent occasion, personal bodyguards examines the premises or venue before their clients arrive to determine where the exits (or emergency exits) and entrances are.

And if you happen to be fit to become a celebrity protection specialist, your job requirements entails having a clean criminal or civil record, 24/7 protection, fitness, presentation, great senses and reflex, and communication skills.

CLEAN RECORD Sad to say, but most private agencies require an aspiring celebrity bodyguard having a clean slate of criminal or civil record, credit checks, extensive background investigations, physical exams, and drug records. If you are shifted to dignitaries or corporate executives as clients, records are of utmost importance. However, depending on the client’s request, there may be exceptions on this rule along the way.

ALMOST 24-HOUR PROTECTION As I have mentioned earlier, where your client goes, you go. And once you become their bodyguard, it is a longtime engagement. Don’t worry you have a day-off — depending on the client’s or your company’s contract.

PHYSICALLY FIT Being physically fit is definitely a requirement. Given the scope of your work, being fit requires you to move fast on crucial situations. Paparazzi! If you work for the listed stars, you get more than a dozen of those, plus the fact that fanatics can be tough to handle.

PRESENTATION If you’re hired to protect dignitaries or executives, a formal and conservative presentation is required. Depending on your client’s profile, they may require you to dress in tux or incognito. And if you’re hired to follow a celebrity client, tattoos and piercing can get away — including a “body builder’s” built.A MORE THAN EXCELLENT SENSES When you work for clients, all of your senses should surpass the crowd’s movement and should work simultaneously. Bodyguards need to be able to recognize potentially dangerous situations and remain calm under pressure. You should have the eyesight of a hawk, the hearing of a bat and a dog’s sense of smell, and possess quick reflexes.

COMMUNICATION SKILLS In shows that feature celebrities, bodyguards get the same exposure in the spotlight either controlling the crowd or not speaking. Bodyguards should have good interpersonal communication skills and strong decision-making skills. Behind the scenes, the bodyguards also serve as a friend to celebrities in downtimes aside from the celeb’s personal assistant or make-up artist.

SECRET SERVICE Since bodyguards accompany their client throughout their day, the bodyguard should be privy to the private life of the client, which means that a bodyguard has to show discretion and maintain confidentiality.

Bodyguard, Executive Protection, Fugitive Recovery, Vehicle Repossessions, Personal Protection

Evaluation of an existing or proposed system and the environment it operates in is a vector approach to threats and how to recognize them. We can determine the complexity of threats and break them down by group. Physical threats can be grouped by the place where the data center lies physically and what could possibly exist within the environment. What is the bedrock geology of the building containing the computer center? How sturdy is the computer room walls constructed and of what material? I have had discussions with data center managers in my career that speak of buildings capable of surviving strong winds, even the effects of a nuclear blast, but not directly, since most likely the building would be away from a concentrated population center, so I am talking about secondary effects of a blast. The heart of the data center is of course the computer room. If it is built with an eye towards containment, then it will survive even a light airplane crash. Also keeping the computer complex on the remote confines outside of a major city and not giving away the true function of the building, no external markings, opaque windows and deliveries by unmarked trucks with a strong perimeter security fence that is manned with a primary entrance and checkpoint keeps the human interest level away from the building. During times of civil disorder, a data center may erect solid concrete pylons to deter even the ramming of trucks into barricades should a hostile crowd become a problem. Contract armed security can be purchased at reasonable rates and goes a long way of protecting the building and the major point of ingress/egress of employees, visitors and maintenance personnel.

Next we can control access to the data center via a security control center which Also can function as the nerve center to co-ordinate the access of all steel doors to the data center via intelligent cards (RUSCO) or newer generation smart cards that can track the assigned person internally in areas of controlled access by job function and also perhaps have some type of active and stored Biometric data of he user to control his/her movements as fixed employees of the company. Temporary workers or visitors or vendors to repair equipment are grouped in short term, high security visibility areas to control there movements.

Environmental protection can be decided by zoning and building code as the building will emit EM and radio interference and that was decided early on as a consequence of the environmental impact statement and building safety codes during the building phase. Third in ranking and importance is the Security of media library / tape vault, for both active and long term storage, governmental archive and other data centers who may physically send tapes for storage at your center. Tapes have to remain unmolested and there contents fully secured from any aberrant that could effect the reliability of encoded data. Data as moved in and out of a vault could also have a smaller sort down area where standard shift processing as needed to feed daily 12 hour shifts. Next we have the Security of microcomputers and any unusual safeguards for these machines and there attachment to external networks as opposed to the mainframe computer room. Housekeeping in the computer room and the attendant management of paper

waste can be a problem for two reasons. The hiring of external contractors to perform the mundane choirs of housekeeping is analogous to through background checks of the persons employed, who for want of a better word, \ clean and that’s all. Paper shredding; document destruction can be done on site via machines and a department assigned to the task or another vendor can be hired for document destruction, the shredding of used computer desktops, that is performing the removal of data from internal storage devices and assuring erasure, and complete destruction. Also the removal of property tags and the striking and removal of the equipment from internal property lists for both internal audit and depreciation for tax purposes. The removal for any other reason, of any restricted storage devices, laptops with critical data or even the excuse to take work home for any reason, other than work may be expressly forbidden due to the nature of the stored data and its security classification. Articles abound in newspapers of laptops being “misplaced” with critical nuclear data on board and even the disappearance of the laptop or even finding the laptop in a dumpster with the property label intact.

A through understanding of the main communication system can be achieved and restricted to assure no threats to privacy and to further and verify the authenticity of telecommunications, with security provided to a password system that has strong password protection and that prompts the user to use varied characters for stronger protection. A unique sign on process with the latest

encryption methods’ and procedures to thwart the most determined hacker. The use and employment of dedicated dial-up lines and internal LAN networks can also be hardened against external assault. An often overlooked and under appreciated area is often the hardware itself. We must remember the current state and proposed state (as in new systems procurement) can be a complex task, to meet management’s goal for processing. We will have to review in a top down fashion all mainframe computer security and TSO access. The JES II master console operators and their levels of training and areas of responsibility. All mini and microcomputer security and all access, both internal and external from remote terminal (RJE) has to be reviewed. All computer system peripheral devices including tape drives, cartridge drives, robot silos, and disk drives, laptops and other unique portable equipment will undergo review.

A complete and through software review and there attendant releases, Versions and available vendor patches and put-tapes will also be reviewed for Vulnerabilities. An open review and capability review of the OS (ZOS?) will Be reviewed and all Applications that are activated and controlled by a Scheduling package (Tivoli OPC, Zeke, Prism or CA7-11) and a through review Of any possibility of subverting these systems. Database security and review May be assigned to a separate team to conduct the unique review.


All operator documentation and related training material as relates to command center persons may have to be reviewed in the context of Sarbanes-Oxley and also within the review of vulnerability assessment due to faulty documentation that does not have a through thought process that is clean and sound in its reasoning and one that adheres to policy and scrutiny by audit.

Towards the end of our survey we may prepare for onsite management a Threat, impact and safeguard matrix that can be used as a training guide for management and to be used for official policy to enforce SLA with both local and state governments. It may also be used to assure stakeholders of the commitment towards vulnerability assessment, disaster recovery, counter measures and potential threat analysis standards and enforcement rules and procedures’. We can thus use these as guides for official behavior and to identify potential risks. We can then draw our own contingency plans or identify external organizations that can perform risk analysis on a contractual basis.

Security News