What is the protective strategy?
DHS Attack Cycle

What is the protective strategy?

For more than 20 years the United States Government (Department of Homeland Security and the FBI) have utilized the Terrorist/Criminal Attack Planning Cycle for the training of their agents and the creation of protective strategies used to protect at-risk individuals and critical infrastructure. I have personally used it to protect government officials, ultra-high-net worth clients, to train hundreds of FBI personnel and Executive Protection (EP) agents, and I have used it to create protective strategies to assist EP teams involved in difficult work.

When conducting EP program reviews, I always evaluate if the Attack Cycle is part of the team’s protective strategy. Favorably, some EP teams fully understand, embrace, and utilize the proper mitigation strategies that can stop the cycle. Some teams are vaguely familiar with the Attack Cycle and have the beginnings of a protective strategy. And, unfavorably, some teams have never even heard of it. They are using Luck as a protective strategy.

?The cycle is eight separate and distinct steps: Target Selection (General), Initial Surveillance, Final Target Selection, Pre-Attack Surveillance, Planning, Rehearsals, Execution, Escape and Exploitation. The length of time between the steps is not consistent. History has shown attackers work through the cycle in a matter of days, weeks, months, and/or years. Some attacks carry through to the final step and some stop at various steps of the cycle. This is the goal of effective protective strategies - to stop the attack.

There exists a myriad of reasons as to why attacks stop but suffice it to say, the vigilance displayed by the target or the target’s visible security has a significant impact on the likelihood of an attack happening.

As way of example, look at the case of Arthur Bremer who shot Alabama Governor George Wallace in 1972. Bremer indicated in his memoir, An Assassin’s Diary, that his original target was President Richard Nixon. After weeks of physical surveillance of known public appearances, Bremer gave up on that attack due to the vigilance he observed from the United States Secret Service Agents protecting President Nixon. Conversely, when Bremer saw the protection around Governor George Wallace, he accurately assessed he could get close and kill or injure the Governor, which he did.?

The case highlights the Attack Cycle and is an excellent reminder as to the need to use effective protective strategies to manipulate, interfere, and/or stop the planning of those wishing to harm protected individuals. Bremer’s initial target list, Step 1, was a general list in the beginning – American Politician. His initial Surveillance of Nixon (Step 2) indicated President Nixon would be a hard target, so he selected another target Governor Wallace (Step 3). He conducted more surveillance (Step 4), procured a weapon, and planned the attack (Step 5 and 6), executed his plan (Step 7) and was caught during the escape (Step 8).

?Effective EP programs assess multiple areas of a protected person’s life. The most effective programs will apply specific protective measures in areas where the risk is higher to the Protectee. Those areas historically have been secure transportation, known public appearances, travel to areas of the world with a higher risk, at home and at the office.

When looking at the Attack Cycle and the ability to mitigate or stop an attack, it is clear that a full-time protective program has a higher chance of success. This is not about money, though it is much more expensive to have a full-time program, it is about detecting the surveillance and stopping the adversary’s planning before the Execution phase. Doing Surveillance-Detection first, then Counter-Surveillance, not the other way around!

?For example, If company A has full time responsibility for the Protectee’s protective coverage at home, work, in-transit, and during travel, the chances they see the white panel van doing physical surveillance at home, work, along the route or at the FBO is much higher than a situation where the security is not comprehensive. An example of a non-comprehensive program: company A is doing home coverage, Company B or Corporate Security is doing office coverage, Company C is doing the daily driving and Company D handles all travel. What are the chances they see the white van? Chances that they share the information amongst the various security comapnies? The chances are precisely ZERO.

?

When the goal is protection of human life, the protective strategy must be well defined and carefully measured against the known tactics, techniques, and procedures of the adversary.

?

James Hamilton,

Founder, Hamilton Security Group LLC

?

-?????? Copyright 2024 -

?

?

?

Kathleen Mills, MPA ACC

Neural Coach - Moving clients from performative to authentic leadership/FBI Senior Executive (Ret)

9 个月

Always enjoy your perspective.

Nancy Thomas

College Graduate Job Search Coach,Private Coaching,University Programs & Seminars,Founding Partner at CompleteCandidate?

9 个月

Great article James!

Andrew Kelly, PSP? CSMP?

Seed Planter & Potential Harvester! Two time Global OSAC Distinguished Achievement Award Recipient.

9 个月

James Hamilton thank you for a informative reminder, similar to other areas of protective risk management there is actual science that should be leveraged to support robust programs and effective strategies that many forget or as you indicate completely are unaware of. It takes a village to organise a mind, and this article is part of reminding practitioners that “knowledge is not power….however, knowledge applied certainly is”!

Joe C.

Instructor for Safety, Security, Survival, & Personnel Recovery/ S.E.R.E.

9 个月

James, great article. Be proactive in your own security also. Without awareness you will never see surveillance. Break the chain of attack cycle by spotting the surveillance. Deter-Detect-Report.

回复

要查看或添加评论,请登录

James Hamilton的更多文章

  • Buying Time - ROI for the EP Professional

    Buying Time - ROI for the EP Professional

    It is close to the end of the year and companies assess what is working and what is not. They decide what areas should…

    12 条评论
  • You Hold the Ace

    You Hold the Ace

    For the last 20 years, I have trained thousands of people. My training has been narrowly focused on protection.

    17 条评论
  • House of Worship: Is the concern Spiritual or Safety?

    House of Worship: Is the concern Spiritual or Safety?

    The radio traffic indicates a man, approximately 35, entered the front door of the Church wearing a hoodie and it is…

    3 条评论
  • Truth and Consequences

    Truth and Consequences

    After my presentations on personal safety, I always have one audience member who says something about my direct and…

    8 条评论
  • Active Shooter - Words Matter!

    Active Shooter - Words Matter!

    During a presentation on Active Shooter recently, I asked the audience if they use any other terms to describe an…

    15 条评论
  • Are you still you?

    Are you still you?

    I was speaking to a security professional the other day, someone I had worked with in the past, and he was asking me…

    17 条评论
  • Start from Reality

    Start from Reality

    In my personal security awareness training, I like to start very early on with a version of this slide: What is your…

    3 条评论
  • I do not always know Why, but I usually know Where.

    I do not always know Why, but I usually know Where.

    It seems impossible to make it through a day without hearing of a killing, kidnapping, or violent assault of someone…

    20 条评论
  • If the problem will be resolved in Seconds, don't choose a solution that is Minutes away.

    If the problem will be resolved in Seconds, don't choose a solution that is Minutes away.

    In 32 years of local law enforcement, FBI, and private security, I have learned many things about keeping people safe…

    6 条评论
  • Consider Leaving it Open

    Consider Leaving it Open

    As a practioner and instructor of close protection, I focus more and more of my time and attention on the two things…

    33 条评论

社区洞察

其他会员也浏览了