Professional Documents
Culture Documents
Introduction
2
You were notified one late night that a key executive in your company was kidnapped and ransom has been demanded.
WHAT ARE YOU GOING TO DO? ARE YOU PREPARED TO RESPOND?
3
More than 20 years ago, kidnapping, extortion and terrorism occur mostly in other countries. In the 90s, incidence of kidnapping, extortion and terrorism occurred with alarming frequency. Threats on executives then escalated from Very Serious to Extremely Serious
4
Terrorism take many forms such as rioting, arson and bombing In recent years, the new and more personal brand of terrorism was kidnapping. It has become so frightening and so effective form of terrorism from the point of view of terrorists Individuals who wield power - financial or political are the attractive targets for
extremists, kidnappers and extortionists
5
Kidnapping has become an INDUSTRY. The only industry that posted phenomenal growth during the Asian currency crisis in 1997 P300M paid
Kidnapping as an Industry
Recruitment and Training Research on Target Victims Resources Planning of Operations Snatching of Victim Hiding of Victim Ransom Negotiation
8
Kidnapping as an Industry
Ransom Collection Sanitation / Clean Up Operation Investment or Money Laundering Neutralization of Obstacles and Cultivation of Support Legal Aspects
9
Worldwide Profile
1997 The Philippines was the 4th kidnap capital of the world with 500 cases or more. Colombia was 1st with 4,000 Mexico was 2nd with 1,400 Brazil was 3rd with 800. 2002 2003 South Africa the new kidnap capital of the world with 3,071 kidnappings and 4,210 abductions
11
Philippine Profile
Foreign Nationals kidnapped: 6 Indians 3 Chinese 2 Koreans 2 Canadians All were released after ransom was paid.
Kidnap Spots :
ARMM NCR Central Luzon Calabarzon 27 12 5 4
4
4 2
14
15
ATTITUDE TOWARDS KIDNAPPING The world-wide trend of violence foretells a threat that many businessmen choose not to recognize the seriousness of the threat. Many corporations, leery of exposing their vulnerabilities to the public, have suppressed reports of successful kidnappings.
17
ATTITUDE TOWARDS KIDNAPPING The world-wide trend of violence foretells a threat that many businessmen choose not to recognize the seriousness of the threat. Many corporations, leery of exposing their vulnerabilities to the public, have suppressed reports of successful kidnappings.
18
3. An Executive Protection Program is prepared and implemented to equip the target executive, family and support personnel with the tools (security countermeasures) to minimize exposure to dangerous situations. 4. Most companies get bodyguards because that is the traditional approach. However, these companies dont know that PREVENTION is much more important and effective.
20
Advantages? Disadvantages?
21
24
POLITICAL KIDNAPPING
Victim is normally not harmed Kidnappers aim for greater propaganda impact (Patricia Hearst Case1974)
Unintentional harm occurs due to an accident, sometimes when victim resisted Intentional harm cannot be ruled out
25
CRIMINAL KIDNAPPING
Usually motivated by personal gain Traditional demand for ransom Harm is inevitable as victim is of no value after ransom is paid
26
PASSION KIDNAPPING:
Jilted or Jealous Lover Will exact vengeance and kidnap a person at the spur of the moment
Psychology of Abduction
28
Indecisiveness on Protection:
Distrustful on protection offered to him
Fluctuation between agreement and disagreement with protective measures Demonstrates constant change in attitude toward security
32
THE KIDNAPPER
Uses the element of SURPRISE to sow confusion and frighten everyone Careful and patient planner Devote a great amount of time, effort and resources Learn more on intended victim thru close observation over a period of time. Aim to know where victim is most vulnerable.
33
COVERAGE OF AN EXECUTIVE PROTECTION PROGRAM prevention planning kidnap attempt hostage survival vehicle security defensive driving bomb threat contingency duress code
36
crisis management current dossiers psychology and probability of abduction pros and cons of escape attempts risk factors involved development of strategies to cope with the problem
37
Responsibility
The Executive Protection Specialist is in charge of the planning, development and execution of the program The present trend now is the setting up of a Crisis Response Team backed up by a working committee composed by: COO or representative Security Chief Treasury Chief Negotiator PR man
39
1. 2. 3. 4. 5.
Executive Terrorism has been experienced many times over by almost every country. Private organizations and public agencies worked in top speed to define the risk, assess vulnerability, and develop strategies that are both preventive and responsive. Companies not primary targets should also have a program for contingency.
41
Case Studies
Assassination of Yitzhak Rabin Why was his killing not prevented? "There was a colossal failure of the General Security Service (GSS) which led to Rabin's assassination. They had many tips and many leads about the killer's intention to murder the prime minister and they ignored them. Failed Attempt PCC President Nemesio Prudente Why did the killers failed?
46
Phase I - En route to the office, country club, or other locations routinely visited Use of Route Driver as bodyguard Advance Party, Close In and Back Up Security Weapons Communications Vehicle type and profile
Evasive Actions
Support along the route and destination
49
Phase II - Inside the Facility Housing the Executive Offices Access control is established Surveillance, Alarm and Access Control Systems should be considered including use of panic buttons Board Room Check (against bugs) Custodial Staff Screening Passage Check no obstruction, for emergency exit / escape Building Check for structural durability
50
Phase III - Precaution During Lunch Within the building, no need for additional security measures Outside the building - private club or restaurant apply Phase I and VII to a certain degree. Apply Phase I (or V) when returning to office.
51
Phase IV - In the Business Office Follow Phase II again throughout the working day: Access Control Surveillance and Alarm System Board Room Check Custodial Staff Screening Passage Check Building Check
52
Phase V - En route Home Follow Phase I again: Use of Route Driver as bodyguard Advance Party, Close In and Back Up Security Weapons Communications Vehicle type and profile Evasive Actions Support along the route and destination
53
Phase VI - Protection of the Executives Residence Conduct complete physical security survey to establish appropriate security measures. Protection should be realistic and not interfere with normal activities of the family. Educate the family & household staff on basic security, safety and emergency procedures including telephone security and access control. Apply Security or Defense-In-Depth (a 3layered barrier system)
54
Security or Defense-In-Depth
55
Presence of friendly installations in the perimeter like: police station military base LGU installations public frequented places private security forces barangay tanods friendly neighborhood religious institutions
56
Protection of the residence include human, structural, animal, electronic, man-made or natural barriers
57
2nd Layer of security Install fences or walls Gates should remain locked when not in use Install controlled protective lighting Install CCTV system Use trained dogs; geese, chickens, birds, etc Hire uniformed armed guard/s or caretaker Use video intercoms to id visitors.
58
The inside of the residence is protected by walls, windows, doors, cameras, alarms, secret passages and a strong room.
59
Phase VII - Social Functions Apply Phase I whenever a car is used Apply Phase III if function is in a private club or public frequented place Avoid using reserved tables and change table location frequently The bodyguard should remain either near the entrance or seated in the dining area at an adjoining table. For sports activities, the routine should be changed. Activities should be low-keyed. On speaking engagement, public announcement should be made after the address and not before.
60
Phase VIII - Stockholders Meetings Protection is dictated by current climate and type of business Make prior coordination with venue officials and support services Have executive arrive just before meeting starts Consider using alternative entrance Implement access control Employ covert personnel
61
Coordinate with local authorities for situation update, crowd control, area security and deterrence aspect Use surveillance cameras Record by video and still photos the entire proceedings Sweep the venue for bugs and bombs Get list of venue personnel who will serve in the meeting Establish media room far from public view Change geographical location of the meetings to places where protesters cannot get support.
62
Phase IX - Corporate Travel By Air 1. Secure aircraft, if owned. Degree of protection is the same as that in the business office 2. Secure aircraft 24 hours a day until departure. 3. Use caution. Always search the aircraft immediately prior to flights. 4. Establish access control and review pilots chart 5. Double check luggage 6. If using commercial aircraft, dont announce travel schedule; use other 63 names in reservation
7. Escort executives to the passenger screening point in airport 8. If situation dictates, use combination of corporate and commercial aircraft for travel 9. Use 2 or 3 planes for large groups. Never place all your eggs in one basket.
By Land - advance party is sent or arrange for pick up, use pre-planned route. Billet Security - accredit the place, get assurance of confidentiality, make prior coordination
64
Phase X - Vacation The toughest protection assignment and protection dependent on number of travellers, mode of travel and location. Consider the following: Low Profile - Publicity be done after the travel, not before Avoid trouble areas Use sound judgment Do not announce Arrange for mail pick up, lawn clearing newspapers and bills delivery, divert phone calls, etc
65
Examine wifes social activity brief her on various precautions she should constantly exercise Train the family and household staff Keep personal data of each member of the family
66
68
Thank you