Muutke küpsiste eelistusi

Introduction to Executive Protection 3rd New edition [Kõva köide]

  • Formaat: Hardback, 402 pages, kõrgus x laius: 254x178 mm, kaal: 953 g, N/A; 58 Illustrations, black and white
  • Ilmumisaeg: 01-Dec-2015
  • Kirjastus: Productivity Press
  • ISBN-10: 1498717594
  • ISBN-13: 9781498717595
Teised raamatud teemal:
  • Kõva köide
  • Hind: 97,74 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 402 pages, kõrgus x laius: 254x178 mm, kaal: 953 g, N/A; 58 Illustrations, black and white
  • Ilmumisaeg: 01-Dec-2015
  • Kirjastus: Productivity Press
  • ISBN-10: 1498717594
  • ISBN-13: 9781498717595
Teised raamatud teemal:
At a time when personal security risks are on the rise internationally, Introduction to Executive Protection, Third Edition takes readers beyond "the wizards curtain" of fear, unawareness, and surprise to give them the tools to sharpen or renew their skills so those they are tasked with protecting remain safe.

This third edition of a bestseller goes beyond the basics which were at the heart of the first and second editions. Though it still covers those basics, it goes further by exploring and discussing the lessons learned in the history of assassinationfrom ancient times to the present.

Examining the psychological, philosophical, professional, and training aspects of close personal protection, this edition represents the latest thinking on executive protection in light of increased personal security risks worldwide. It discusses both residential and business security and also covers the first response for natural events such as common medical emergencies.

Using his experience from the U. S. Secret Service, the private sector, and his private training, the author includes real-world examples of political and religious assassination attempts. He also provides practical advice on close personal protection of VIPs, celebrities, and business executives.

Filled with illustrations that demonstrate the various protection methods in action, Introduction to Executive Protection, Third Edition is much more than an introduction. It is a powerful learning tool in the art of close personal protection. It offers insights and considerations that both the novice and practiced veteran will find invaluable in their quest to ensure personal protection.

Arvustused

"During his distinguished career, Dale June has personally protected dozens of industry CEOs and global political figures. In his book, Introduction to Executive Protection, Dale offers deep context, savvy insights, and street smart field-proven techniques and advice for protecting the principal. This is a must-read for anyone who wants to provide this critical service to others." Samuel R. Kephart, CEO, Virtual Acumen, Inc.

Background xix
Preface xxix
Acknowledgments xxxi
About the Author xxxiii
1 Introduction
1(6)
Adrenaline Dump
3(1)
Stop the Assassination
4(1)
Protective Intelligence---Threat Assessment
4(1)
Summary
4(1)
Endnotes
5(2)
2 Fear, Anxiety, Courage, and Man's Need for Security
7(16)
Assorted Quotes on Fear
7(1)
Historical Background
8(2)
Reactions to Fear
10(1)
Vulnerability
11(7)
Violence in Society
12(1)
Psychology of Fear and Danger
13(1)
Importance of Understanding Fear
13(3)
Acceptance of Fear---Manifesting Courage
16(1)
Anxiety
16(1)
Courage
17(1)
Understanding the Need for Security (Psychology and Sociology)
18(1)
Maslow's Hierarchy of Needs
18(1)
Understanding Maslow's Hierarchy
19(1)
Summary
19(1)
Endnotes
20(3)
3 The Assassin
23(12)
Weapons of the Assassin
23(4)
Evolution of Attacks and Weapons
24(1)
Sniper Rifle
24(3)
Psychological Profile of the Assassin
27(6)
Psychologically Organized Assassin
27(1)
Psychologically Disorganized Assassin
28(1)
Mixed Organized and Disorganized
28(3)
Professional Assassin
31(1)
Profile of a Professional Assassin
31(1)
Assassination Myths and ECSP Findings
32(1)
Summary
33(1)
Endnotes
34(1)
4 Psychological Perspectives on Security Issues
35(14)
Motivations
35(2)
Sheep, Sheepdogs, and Wolves
35(2)
Psychological Aspects of the Protector
37(2)
The Protectee's Motivation
39(1)
Psychological Aspects of the Protectee
39(3)
It Ain't All Glamour
42(1)
Qualities
42(1)
Motives of the Threatening Person
43(1)
Psychological Motivators for Terrorism
43(1)
American Suicide Bomber
44(1)
Creative Personality---Being Creative
44(3)
Creative Personality
45(1)
Other Motivators
46(1)
Summary
47(1)
Endnotes
48(1)
5 Thinking: Problem Solving
49(14)
Critical Thinking
50(4)
Tools of Thinking
54(6)
Emotional Intelligence
60(1)
Summary
61(1)
Endnotes
62(1)
6 Protective Intelligence: Identifying the Potentially Dangerous Subject
63(16)
Introduction
63(1)
Identifying the Human Danger Factor
64(3)
Drastic Changes in Habits
65(1)
Talk about Guns, Weapons, Violence, or Getting Even
66(1)
Emotional Trauma
66(1)
Protective Intelligence Investigation
67(4)
Written Threat Analysis
67(1)
Voice, Tenor, and Tone
68(1)
Motivation
69(1)
Topic
69(1)
Jargon
69(1)
The Ending
70(1)
The Unidentified Maker of a Threat
70(1)
The Intelligence Analysis
70(1)
Psychological Perspectives
71(5)
Major Depressive Episode
72(1)
Manic Depression---Bipolar Disorder
72(1)
Antisocial Personality Disorder
73(1)
The Power Syndrome
74(1)
Intermittent Rage Disorder (IRD)
75(1)
Alienation or Isolation
75(1)
Borderline Personality Disorder
75(1)
Schizophrenia including Paranoia
76(1)
Identifying the Dangerous Person in a Crowd
76(1)
Assessments
76(1)
Summary
77(1)
Endnotes
78(1)
7 Close Personal Protection: What It Is and What It Isn't
79(22)
What Is Close Personal Protection?
79(1)
Roots: Personal Protection and Private Security
80(3)
Chivalry of Knights and Protective Agents
81(1)
Historical Antecedents
81(1)
The Pinkertons
82(1)
Executive, VIP, and Celebrity Protection
83(1)
Bodyguard versus Executive Protection
84(4)
Executive Protection and Close Personal Protection
84(1)
Bodyguards
84(4)
Origins of Executive Protection
88(1)
Heroes? Or Just Another Day at Work?
89(3)
Taking a Bullet
90(1)
Why Protection?
90(2)
Principles of Protection
92(5)
Prepare for Any Eventuality
94(1)
Deterrence
94(1)
How Much Protection Is Adequate, and When Does Adequate Become Excessive?
95(1)
Hardening the Target
95(1)
Concentric Circles
96(1)
Who Are the Principals or Protectees?
97(1)
Summary
98(1)
Endnotes
99(2)
8 Becoming a Protective Agent
101(18)
The Protective Recruit
101(1)
Requirements, Character, and Conduct
102(7)
Mundanity of Excellence
103(2)
Professionalism
105(1)
Professional Attitude
106(1)
Professional Appearance
106(1)
Physical Condition
107(1)
Professional Personality
108(1)
Communication Skills
108(1)
Personal Characteristics
109(1)
The Keys to Professionalism and Success
109(1)
The Four I's of Professionalism and Success
109(1)
Other Components of Professionalism and Success
110(6)
Respect and Responsibility
110(1)
Self-Knowledge
110(1)
Mental Stability: Dealing with Stress and Anxiety
111(1)
Leadership Skills
111(1)
Productivity
111(1)
Planning
111(1)
An Eye for Detail
112(1)
Decisiveness
112(1)
Decision Making
112(1)
Inclination toward Action
112(1)
Flexibility
113(1)
Adapt Well to Any Given Situation
114(1)
Ability to Improvise
114(1)
Courage
114(1)
Ability, Stamina, Strength, Coordination
114(1)
Assertiveness
115(1)
Humor
115(1)
Mental Agility
115(1)
Family
115(1)
Forbearance (Patience)
116(1)
Summary
116(1)
Endnotes
117(2)
9 Qualities and Tools of a Protective Agent
119(22)
Character
119(1)
Professional Conduct
120(10)
Alcohol
121(1)
Energy Drinks
122(1)
Top 10 Energy Drink Side Effects
123(1)
Potential Problems from Specific Ingredients
123(2)
What Is Safe for You?
125(1)
Be Careful of Preexisting Conditions
125(1)
Attitude
125(1)
Cooperation
126(1)
Courtesy
126(1)
Demeanor
126(1)
Dependability
126(1)
Diplomacy
126(1)
Discipline
127(1)
Discretion
127(1)
Edibles (Eating Habits)
127(1)
Gum Chewing and Smoking
128(1)
Honesty
128(1)
Image
129(1)
Know Your Limitations
129(1)
Knowledge
129(1)
Loyalty
130(1)
Perception
130(1)
Provide Good Service
130(1)
The Police and Protective Agent Image as "Warriors"
130(1)
Protective Agent Equipment
131(2)
Weapon
132(1)
Carrying a Concealed Weapon
132(1)
Shotguns and Other Weapons
132(1)
Personal Body Armor
133(1)
Personal Conduct (Protectee Protocol)
133(3)
Working with the Press (Media Relations)
136(2)
Working with the Host Committee
138(1)
Summary
139(1)
Endnotes
140(1)
10 A Code to Live By
141(8)
Ethics
141(1)
Code of Ethics
142(2)
Personal Protection Specialist Code of Ethics
142(1)
Definition of the Personal Protection Specialist Code of Ethics
143(1)
Samurai Code---The Way of the Warrior
144(1)
Law Enforcement Code of Ethics
145(1)
Summary
146(1)
Endnotes
147(2)
11 Education, Training, and Experience
149(10)
Vires per Eruditionem---Strength through Education
149(1)
Twenty-First Century Educational Pioneers
150(1)
Protection Training
151(5)
Training
151(1)
Training for Certainty
152(1)
Scenario Simulation Training
152(2)
Education---Educating for Uncertainty
154(2)
Summary
156(1)
Endnotes
157(2)
12 What? No Badges?
159(12)
Public Agencies and Private Enterprise
159(1)
Contrasting and Comparing Public and Private Agencies
159(3)
Legal Restrictions
162(9)
Conflicts of Interest
163(1)
Similarities
164(1)
Legal Consequences
165(2)
Recommendations to Be Considered by Protection Agents
167(1)
Summary
168(1)
Endnotes
169(2)
13 Dynamics of Protective Team Building
171(8)
Teamwork
171(1)
Communication
172(1)
Training
172(1)
Team Leadership
173(1)
Importance of Teamwork in Close Personal Protection
173(2)
The Protectee as Team Member
175(1)
Team Building
176(1)
Team Esprit
176(1)
The Team Player
177(1)
Summary
177(1)
Endnotes
178(1)
14 A Principal's Point of View
179(12)
Know the Protector
179(1)
What Does a Protectee Expect?
179(10)
Summary
189(1)
Endnotes
189(2)
15 Working the Principal: More than Standing and Waiting
191(30)
Know the Protectee
191(1)
Client Profiling
192(1)
Understanding the Principal and Your Relationship
192(3)
A Protectee and a Protection Agent Have a Special Relationship
193(1)
What Does It Mean to "Get Too Close" to the Protectee?
194(1)
Feelings, Nothing More than...
194(1)
Working in Close Proximity
195(8)
Four-Man "Diamond" Formation
199(1)
Box Formation
199(1)
Elevator Entry
199(2)
One Agent with Protectee
201(1)
One Protection Agent
202(1)
Two Protection Agents
202(1)
Three Protection Agents
203(1)
Reactions
203(5)
Deceptive and Diversion Tactics
208(1)
Working a Principal in a Crowd
209(2)
Protecting Spouses, Children, and Teenagers (Family Protection Details)
211(2)
Spouse
211(1)
Child to Age Twelve
211(1)
Teenagers
212(1)
Protective Etiquette
213(1)
Protocol
214(1)
Security Posts
215(4)
The Checkpoint
215(1)
Surveillance Post
216(1)
Surveillance Post General Instructions
217(1)
Specialty Posts
217(2)
Identification
219(1)
Summary
219(1)
Endnotes
220(1)
16 Principal's Home, Work, and Play
221(16)
Estate Security
221(2)
Planning
223(1)
Physical and Psychological Barriers
224(1)
Technological Systems
225(1)
The Residential Building
226(1)
Procedures
226(1)
People
227(1)
Office Security
228(4)
Access Control
229(1)
Corporate Secrets, Industrial Espionage, and Theft
229(1)
Computer Security
230(1)
Security Awareness
231(1)
Safety
232(1)
Safety Consciousness
233(1)
Natural and Man-Made Disasters
233(1)
Emergency Operations Plan
233(1)
Summary
234(1)
Endnotes
235(2)
17 The Car and Driving
237(18)
What If
246(1)
The Follow-Up
247(5)
Vehicle Security
252(1)
Summary
253(2)
18 The ABCs of Medicine
255(14)
Medical Emergencies
255(2)
Primary Survey
257(2)
Secondary Survey
259(1)
Provide Needed Emergency Care
259(7)
Rescue Breathing Resuscitation
259(1)
Control of Bleeding
260(1)
Tactical Combat Casualty Care
261(1)
Tourniquet Use Guidelines
261(1)
The Facts
261(1)
Shock Treatment
262(1)
Choking
262(1)
Heart Attack
263(1)
Stroke
263(1)
Heat Stroke and Heat Exhaustion
264(1)
Burns
264(1)
Hyperthermia
265(1)
Hypothermia
265(1)
Medical Kit
266(1)
Summary
266(1)
Endnotes
267(2)
19 Preparing for the Big Dance---The Advance
269(24)
Anticipate
270(1)
Plan
270(1)
Prepare
270(1)
What Is an "Advance"?
270(2)
What Is Common Sense? Using Your Brain
272(1)
Anticipate, Plan, and Prepare
273(1)
Anticipation
273(1)
Planning
273(1)
Preparation
274(1)
Conducting a Protective Advance
274(7)
Situation Reports---"Sit Reps"
278(1)
Diagrams, Maps, Photos: Their Role in the Security Process
278(1)
The Role of Protective Intelligence in an Advance
278(1)
The Role of Technical Surveillance Countermeasures in an Advance
279(1)
You Have a Complex Advance? Simplify It
279(1)
Defining a Complex Advance
279(1)
Breaking it All Down
280(1)
Putting it all together
280(1)
Psychological Perspectives of an Advance
280(1)
Writing an Advance Security Survey Report
281(1)
Purpose
281(1)
Format
281(1)
Other Duties of an Advance Man
282(1)
What If It Is Not Possible to Have an Advance Man?
283(1)
Terrorist (Mirror) Advance
283(3)
Attacker's Viewpoint
283(1)
Mirror Image
283(1)
The Mirror Effect
284(2)
Terrorist Intelligence and Planning
286(4)
First Stage---Research, Reconnaissance, Surveillance, Countersurveillance
286(1)
Reconnaissance and Research
286(1)
Other Things to Know
287(1)
Surveillance and Countersurveillance
287(1)
Countersurveillance
288(1)
Second Stage: Planning
289(1)
Third Stage: Execution
289(1)
Important Recommendations
289(1)
After the Operation
290(1)
Summary
290(1)
Endnotes
291(2)
20 Ambushes: Recognizing and Reacting
293(10)
Recognizing Indicators of a Possible Ambush Attack (or Not)
293(1)
Recognizing Elements of an Ambush Attack
294(3)
Countering an Ambush
297(1)
No Surprises! Anticipation, Recognition, Reaction
298(2)
Anticipation
298(1)
Action
298(1)
Indicators of a Pending Ambush Attack
299(1)
Prepare for Realities
300(1)
Reaction
300(1)
Ambush!
300(2)
Response to an Ambush
301(1)
Summary
302(1)
Endnotes
302(1)
21 Staying Alive!
303(12)
Life Is Simply a Matter of Balance and Circles
303(1)
Staying Alive as an Attack Victim
303(1)
Suddenness/Surprise/Violence
304(1)
Laser-Minded Intent
304(1)
Self-Defense
304(1)
Recognizing and Reacting to an Attack
305(1)
Environmental Weapons
305(1)
Improvised Weapons
306(1)
The Human Body as a Weapon
306(4)
Escalation of Violence
308(1)
Offensive Weapons
309(1)
Vulnerable Areas
309(1)
Controlling the Circumstances under Stress
310(1)
Staying Alive as a Hostage---Hostage Response
311(2)
Summary
313(1)
Endnotes
313(2)
22 Of Demons, Gremlins, Dragons, and Other Things
315(12)
Demons and Gremlins
315(1)
Anxiety Dreams
316(2)
Understanding Oneself and the Emotional Price to Be Paid
318(1)
Temptations
319(1)
The Dragons of Personal Problems
320(2)
Tips and Advice
322(1)
Frustrations
323(2)
Professionalism and a Few Last Words
325(1)
Endnotes
326(1)
23 Summary: Keep a Safe, Secure Environment
327(6)
Assassination
327(1)
Be Confident
327(1)
Principles of Protection
327(6)
Anticipation
327(1)
Planning
328(1)
Preparation
328(1)
Maintain Insulation---Three Rings of Protection
328(1)
Detect--Disrupt--Deter
328(1)
Advance the Locations
328(1)
Plan Manpower
328(1)
Be a Professional!
328(5)
Appendix A Close Personal Protection Team Member Self-Assessment Survey
333(6)
Appendix B Terrorist Advance Checklist
339(4)
Necessary Characteristics of Special Operations
339(2)
1 Research (Reconnaissance) Stage
339(1)
From the Outside
340(1)
From the Inside
340(1)
Before the Operation
340(1)
2 Planning Stage
341(1)
3 Third Stage: Execution
341(1)
After the Operation
341(1)
Endnotes
341(2)
Appendix C Advance Protective Agent Checklist
343(16)
Things to Do before Departing for an Assignment
343(1)
Principal
343(1)
Arrival at Site/City of Visit
344(1)
Site Surveys
345(1)
Types of Security Surveys
346(1)
Basic Perimeter Security Theory
347(1)
Things to Consider While Developing Plans
347(1)
Hotel Advance
348(3)
Principal's Suite
348(1)
Command Post
348(1)
Hotel Services
348(1)
Fire System
349(1)
Other Hotel Advance Considerations
349(1)
Hotel Advance
349(1)
Make a Thorough Examination of the Principal's Suite
349(1)
Meeting with Rooms Reservation Manager
350(1)
Meeting with Assistant Manager and Security Chief
350(1)
Command Post Equipment
351(1)
Equipment
351(1)
Route Survey
352(1)
Airport Security Surveys
353(1)
Banquets, Ballrooms, and Auditoriums
353(2)
Restaurants
355(1)
Outdoor Events
356(1)
Team Movement (on Foot or Vehicle)
356(1)
Team Briefing
357(2)
Appendix D Transportation Advance Checklist
359(8)
Summary of Vehicle Safety Tips
362(1)
Selection, Modification, Maintenance, and Inspection of Vehicles
363(1)
Protecting against and Searching for Car Emplaced Bombs, Mechanical Sabotage, and Signs of Tampering
364(3)
Appendix E Hospital Survey Checklist
367(12)
Hospital Emergency Questions and Answers
373(6)
Glossary of Terms 379(8)
Index 387
Dale L. June is a former U.S. Secret Service Agent assigned to the Presidential Protective Division at the White House with three presidents. He is also a former U.S. Army military policeman and member of a military Honor Guard (110th MP Platoon, Stuttgart, Germany), city police officer (Redding and Sacramento, California), U.S. Customs intelligence specialist specializing in organized crime and terrorism, private investigator, and executive protection specialist. He has worked directly with executives of multinational corporations, VIPs, political figures, royalty, and celebrities. He has also worked as a liaison for law enforcement, fire department and medical personnel, and international law enforcement agency personnel.

Mr. June earned his M.A. in criminal justice from George Washington University and his B.A. in public administration from California State University, Sacramento. He is a co-founder of Henley-Putnam University and writer of approximately 40 of the universitys original courses. Mr. June has nearly three decades of experience teaching at the college and university levels as an instructor of criminal justice, psychology, sociology, history, and drug- and addiction-related courses and is an avid reader of psychology-related material to gain insight into the psychological, sociological, biological, and human behavioral causes and remedies of dysfunction, depression, addictions, and personality factors.

He is experienced in psychological profiles of potential workplace violence offenders and in contingency planning and crisis management. Duties have included making potential life-threatening decisions, analyzing specific corporate problems, interviewing people with mental problems, and assigning risk-factor percentages to protect celebrities, VIPs, and political figures including the president of the United States.