| Acknowledgments |
|
xvii | |
| Author |
|
xix | |
| Introduction |
|
xxi | |
|
Chapter 1 Important Personal Security Concepts |
|
|
1 | (6) |
|
|
|
1 | (1) |
|
|
|
1 | (1) |
|
Concepts of Threat, Vulnerability, and Risk |
|
|
2 | (1) |
|
|
|
3 | (1) |
|
Committing a Security Plan to Memory |
|
|
4 | (1) |
|
Threat Agents and Threat Actors |
|
|
5 | (2) |
|
Chapter 2 Personal Security Principles |
|
|
7 | (38) |
|
|
|
7 | (1) |
|
|
|
7 | (21) |
|
Preparing for Contingencies |
|
|
8 | (1) |
|
Developing a Threat Profile: Preparation for Incidents |
|
|
8 | (3) |
|
|
|
11 | (1) |
|
Geographical Memorization: Preparation for Movement |
|
|
11 | (1) |
|
Physical and Mental Health |
|
|
12 | (1) |
|
Physical Heath: Medical Necessities |
|
|
13 | (5) |
|
Physical Health: Health Insurance |
|
|
18 | (3) |
|
Mental Health: Engineering Peace of Mind: Technical Communication Preparation |
|
|
21 | (4) |
|
Clothing and Appearance Preparation |
|
|
25 | (1) |
|
|
|
25 | (1) |
|
Packing for Mobility and Portability |
|
|
26 | (1) |
|
Limiting the Luggage Load |
|
|
27 | (1) |
|
|
|
27 | (1) |
|
Preparing Delay Measure Tools: Throw-Down Wallet |
|
|
28 | (1) |
|
|
|
28 | (4) |
|
|
|
32 | (2) |
|
|
|
34 | (2) |
|
|
|
36 | (6) |
|
|
|
36 | (1) |
|
Delivering Effective Violence (Fighting) |
|
|
37 | (4) |
|
Protecting Yourself from Blows |
|
|
41 | (1) |
|
|
|
41 | (1) |
|
|
|
42 | (1) |
|
Selected Threat Actor Profile: Street Gangsters |
|
|
42 | (1) |
|
|
|
43 | (1) |
|
|
|
44 | (1) |
|
Chapter 3 When Travel Plans Go Sideways |
|
|
45 | (18) |
|
|
|
45 | (1) |
|
|
|
46 | (4) |
|
|
|
46 | (1) |
|
Arrival Hall: Public Space |
|
|
47 | (3) |
|
On the Road: Checkpoints and Roadblocks |
|
|
50 | (9) |
|
General Guidelines for Roadblocks |
|
|
51 | (1) |
|
|
|
51 | (1) |
|
|
|
51 | (1) |
|
|
|
51 | (1) |
|
|
|
52 | (1) |
|
|
|
52 | (1) |
|
|
|
53 | (1) |
|
Police in Criminal-Controlled Regions |
|
|
53 | (1) |
|
Military or Paramilitary Checkpoints in Conflict Zone |
|
|
54 | (1) |
|
Standard Military Checkpoint |
|
|
55 | (1) |
|
Paramilitary, Militia, or Flying Checkpoints |
|
|
55 | (1) |
|
|
|
56 | (3) |
|
Selected Threat Actor Profiles: Roadblocks and Military, Insurgents, and Police |
|
|
59 | (2) |
|
|
|
59 | (1) |
|
|
|
60 | (1) |
|
|
|
61 | (2) |
|
|
|
63 | (46) |
|
|
|
63 | (2) |
|
Classifying Types of Kidnap/Abduction Operations |
|
|
65 | (3) |
|
Type 1 Money but No Politics |
|
|
65 | (1) |
|
Type 2 No Money, No Politics |
|
|
66 | (1) |
|
Type 3 Money and Politics |
|
|
67 | (1) |
|
Type 4 Politics, No Money |
|
|
67 | (1) |
|
Tip of the Iceberg: Keeping Kidnap Threat Trends in Perspective |
|
|
68 | (16) |
|
Top Severe Kidnap Threat Countries for 2016 |
|
|
69 | (3) |
|
|
|
72 | (1) |
|
|
|
72 | (2) |
|
|
|
74 | (1) |
|
|
|
75 | (1) |
|
International Patterns and Trends in Kidnapping |
|
|
76 | (1) |
|
The Gap between Rich and Poor and Failed States |
|
|
77 | (1) |
|
The Collapse of Communism and the End of the Cold War |
|
|
77 | (1) |
|
A Weak Ethical Environment |
|
|
77 | (1) |
|
Arab "Spring," Arab "Winter," and Islamic Extremism |
|
|
77 | (1) |
|
A Closer Look: Kidnap for Ransom |
|
|
78 | (1) |
|
Target Selection Development Phase |
|
|
79 | (1) |
|
Intelligence Gathering Operation |
|
|
80 | (1) |
|
Route Analysis, Snatch Location Selection, and Logistics |
|
|
80 | (1) |
|
|
|
81 | (1) |
|
Abduction Case Study: Victor Cortez |
|
|
82 | (1) |
|
|
|
83 | (1) |
|
Different Types of Kidnapping Operations |
|
|
84 | (1) |
|
|
|
84 | (1) |
|
|
|
84 | (1) |
|
|
|
85 | (1) |
|
|
|
85 | (1) |
|
Measures to Counter the Kidnap Threat |
|
|
85 | (8) |
|
Preparation Principle: Advance Planning Measures Specific to Kidnap |
|
|
85 | (3) |
|
Detection Principle: Countersurveillance |
|
|
88 | (1) |
|
Principle of Deterrence: Crafting a Low, Unpredictable Profile |
|
|
89 | (2) |
|
Principle of Delay: Slowing Down the Abduction |
|
|
91 | (1) |
|
Principle of Defense: Survival Strategies in Captivity |
|
|
91 | (2) |
|
|
|
93 | (1) |
|
Executive Protection: Key Elements of a Program |
|
|
94 | (9) |
|
Program Development: Step 1 Risk Assessment |
|
|
95 | (1) |
|
Program Development: Step 2 Protection Plan |
|
|
96 | (1) |
|
Program Development: Step 3 Stakeholder Engagement: The Human Factor |
|
|
97 | (1) |
|
Program Development: Step 4 Planning Process Document |
|
|
98 | (4) |
|
Program Development: Step 5 Implementation |
|
|
102 | (1) |
|
Selected Threat Actor Profile: The Mind-Set of a Kidnapper |
|
|
103 | (1) |
|
|
|
104 | (3) |
|
|
|
107 | (2) |
|
Chapter 5 Patterns of Threat in the Environment |
|
|
109 | (28) |
|
|
|
109 | (1) |
|
|
|
110 | (1) |
|
Alcohol, Drugs, and the Environment |
|
|
111 | (2) |
|
|
|
113 | (16) |
|
|
|
115 | (14) |
|
|
|
129 | (3) |
|
Civil Disorder and Rioting |
|
|
132 | (2) |
|
|
|
134 | (1) |
|
|
|
135 | (2) |
|
Chapter 6 Hotel and Residential Security |
|
|
137 | (18) |
|
|
|
137 | (3) |
|
Considerations when Choosing a Hotel |
|
|
140 | (8) |
|
Location and Layout Trumps Amenities, Convenience, and Proximity |
|
|
140 | (2) |
|
|
|
142 | (1) |
|
Hotel Arrival: Deterrence and Delay |
|
|
143 | (1) |
|
Standoff and Perimeter Security |
|
|
143 | (1) |
|
|
|
143 | (1) |
|
Arrival to Check-In: Moving from Public to Private Space |
|
|
144 | (1) |
|
Communications: The Need to Know |
|
|
144 | (1) |
|
|
|
144 | (1) |
|
Moving from Public to Private Space: Front Desk to Room |
|
|
145 | (1) |
|
|
|
146 | (1) |
|
|
|
146 | (1) |
|
Initial Entry to the Room |
|
|
146 | (1) |
|
|
|
146 | (1) |
|
In the Event of a Security Incident or a Fire |
|
|
147 | (1) |
|
|
|
148 | (1) |
|
|
|
148 | (5) |
|
Residence Selection: Security Preparation and Planning Measures |
|
|
149 | (1) |
|
Perimeter: Security Detection and Delay |
|
|
149 | (1) |
|
Gate Guards: Deterrence, Detection, Delay, and Response |
|
|
149 | (1) |
|
|
|
150 | (1) |
|
Exterior Lighting and Decorative Shrubs: Detection and Deterrence |
|
|
150 | (1) |
|
Ground Floor Windows and Doors and Exterior: Security Delay Measures |
|
|
151 | (1) |
|
Inside the Residence: Layering Your Defenses |
|
|
151 | (1) |
|
|
|
151 | (1) |
|
|
|
151 | (1) |
|
Delay: Importance of Establishing a Safe Room |
|
|
152 | (1) |
|
|
|
152 | (1) |
|
Selected Threat Actor Profiles: Pickpockets, Thieves, and the World's Oldest Profession |
|
|
153 | (1) |
|
|
|
154 | (1) |
|
Chapter 7 Cybersecurity on the Road |
|
|
155 | (14) |
|
|
|
155 | (1) |
|
|
|
155 | (1) |
|
Foreign Intelligence Service Threat |
|
|
156 | (8) |
|
|
|
157 | (2) |
|
|
|
159 | (1) |
|
|
|
159 | (1) |
|
Personal Cybersecurity Program for the Business Traveler |
|
|
160 | (1) |
|
Established Secure Baseline of Information Security |
|
|
160 | (1) |
|
|
|
161 | (1) |
|
|
|
162 | (1) |
|
|
|
162 | (1) |
|
|
|
163 | (1) |
|
|
|
163 | (1) |
|
|
|
164 | (3) |
|
|
|
167 | (1) |
|
|
|
168 | (1) |
|
Chapter 8 Shopping Malls, Sports Stadiums, Theaters, etc.: Soft Targets |
|
|
169 | (14) |
|
|
|
169 | (1) |
|
|
|
170 | (2) |
|
|
|
172 | (1) |
|
Considerations about the Threat |
|
|
173 | (1) |
|
Response Countermeasure 1: Active Shooters |
|
|
174 | (3) |
|
|
|
175 | (1) |
|
|
|
175 | (1) |
|
|
|
176 | (1) |
|
|
|
176 | (1) |
|
|
|
177 | (1) |
|
Response Countermeasure 2: Suicide Bomber |
|
|
177 | (2) |
|
|
|
177 | (1) |
|
|
|
178 | (1) |
|
|
|
178 | (1) |
|
Selected Threat Actor Profiles: The Jihadist Suicide Bomber |
|
|
179 | (2) |
|
|
|
181 | (1) |
|
|
|
182 | (1) |
|
Chapter 9 Risk Assessment for Personal Security |
|
|
183 | (28) |
|
|
|
183 | (1) |
|
Step 1 Identify Assets and Impact of Loss |
|
|
184 | (6) |
|
Identify Undesirable Events and Anticipated Impacts |
|
|
185 | (1) |
|
Value/Prioritize Assets Based on Consequence of Loss |
|
|
185 | (1) |
|
Impact on Business or Mission Function |
|
|
186 | (3) |
|
Impact on Health (Sickness, Injury, and Death) |
|
|
189 | (1) |
|
|
|
189 | (1) |
|
|
|
189 | (1) |
|
Step 2 Identify and Characterize the Threat to Specific Assets |
|
|
190 | (7) |
|
Identify Threat Categories and Potential Adversaries |
|
|
190 | (1) |
|
|
|
191 | (1) |
|
|
|
191 | (3) |
|
Skill and Workforce Capability of the Adversary |
|
|
194 | (1) |
|
Determine the Logistic Capability of the Adversary |
|
|
194 | (1) |
|
Determine Frequency of Threat-Related Incidents Based on Historical Data |
|
|
194 | (1) |
|
Determine the Favorability of the Operational Environment |
|
|
195 | (2) |
|
Step 3 Identify and Characterize Vulnerabilities |
|
|
197 | (6) |
|
Identify Vulnerability Vectors with Public Knowledge (Recurring, Nonrecurring, and Time) |
|
|
200 | (1) |
|
Predictability (Itinerary, Movement, and Accommodation) |
|
|
201 | (1) |
|
|
|
201 | (1) |
|
|
|
202 | (1) |
|
Proximity (Collateral Damage Potential) |
|
|
202 | (1) |
|
Step 4 Assess Risks and Determine Priorities for you and Your Team's Protection |
|
|
203 | (3) |
|
Estimate the Degree of Impact Relative to Yourself or Your Team Members |
|
|
203 | (1) |
|
Estimate the Likelihood of Attack by a Potential Adversary |
|
|
203 | (3) |
|
Estimate the Likelihood That a Specific Vulnerability Will Be Exploited |
|
|
206 | (1) |
|
Determine the Relative Degree of Risk |
|
|
206 | (1) |
|
Step 5 Identify Unacceptable Risks and Determine Risk Mitigation Priorities |
|
|
206 | (2) |
|
Identify the Benefits and Costs of the Countermeasures |
|
|
207 | (1) |
|
Identify the Cost of the Countermeasures |
|
|
207 | (1) |
|
|
|
208 | (1) |
|
|
|
209 | (2) |
|
Chapter 10 Personal Security and Transportation: Securing Your Movement |
|
|
211 | (24) |
|
|
|
211 | (1) |
|
|
|
211 | (2) |
|
Ground Transportation: Vehicle and Rail |
|
|
213 | (16) |
|
|
|
213 | (1) |
|
General Bike-Locking Principles |
|
|
214 | (1) |
|
|
|
215 | (1) |
|
|
|
215 | (1) |
|
|
|
216 | (1) |
|
|
|
217 | (3) |
|
|
|
220 | (1) |
|
|
|
221 | (1) |
|
|
|
222 | (1) |
|
Safety and Security Risk Considerations |
|
|
223 | (6) |
|
|
|
229 | (4) |
|
Prepacking for Security and Safety |
|
|
229 | (1) |
|
|
|
230 | (1) |
|
|
|
230 | (1) |
|
|
|
231 | (1) |
|
|
|
232 | (1) |
|
|
|
233 | (1) |
|
|
|
234 | (1) |
|
Chapter 11 Managing Your Team's Personal Security |
|
|
235 | (10) |
|
|
|
235 | (1) |
|
|
|
236 | (1) |
|
|
|
236 | (1) |
|
|
|
237 | (1) |
|
|
|
238 | (1) |
|
|
|
239 | (1) |
|
|
|
240 | (1) |
|
Managing Crisis Situations |
|
|
240 | (5) |
|
|
|
241 | (1) |
|
|
|
241 | (1) |
|
Loss of Command and Control: Criticality of Communications |
|
|
242 | (1) |
|
Loss of Security and Safety |
|
|
243 | (1) |
|
Postcrisis Considerations |
|
|
243 | (2) |
| Conclusion |
|
245 | (2) |
| Index |
|
247 | |