Test Flash Cards 4
(47 cards)
Key Terms for a Security Advance
Advance Team
The individual or group of individuals who go ahead of the principal and close protection team, to plan and vet the security advance plan according to the vulnerability and risk assessments provided
Key Term
Vulnerability Assessments
Also known as inteligence reports; risk, threat, and vulnerability assessments (RTVAs). The set of information that lays out the risks and vulnerabilities that must be mitigated with a security plan (i.e., in a location with little to no modern medical capabilities, agents must bring medical support).
Key Term
Site Surveys
The complete set of information about a site, including room layouts, path of travel for principal, emergency services on site (such as generators, emergency exits, response times for emergency personnel).
Key Term
Remain Overnight/Hotel Security Plan
Additional set of protocols and advance security plans if the principal is remaining overnight.
* plan for overnight security
* general site security assessment for where the principal is staying
* Evacuation or emergency relocation plans
* Communication plans to/from principal and overnight security team
Key Term
Motorcade Routes
Planning primary and alternate routes of travel for the principal’s motorcade according to local traffic patterns. This is typically rehearsed by the security team one to two days in advance at the time(s) the principal will be traveling. Motorcade route and security planning also includes a motorcade manifest of the individuals planned to be or allowed in a motorcade and a general seating assignment for the motorcade.
Key Term
Arrival/Departure Areas
Where principals are arriving and departing from each location, typically primary and alternate arrival/departure areas. Contingency plans should specify what to do if primary areas are unavailable and when agents should default to the alternate location
Key Term
Path of travel
The walking path of the principal upon arrival to each location (i.e. exit vehicle, move down hallway to hold room, proceed to stage left, proceed to state, exit stage left, proceed to media room, proceed back down hallway to departure area, exit to motorcade)
Key Term
Access Control List
The set of individuals allowed into a site, backstage area, etc. where the principal will be.
Key Term
Run of Show
The schedule/itinerary of any event the principal is attending or featured in.
Key Term
Trip Itinerary
The full itinerary of the trip if the principal’s events involve travel, including flight arrival/departure times; manifests; all event arrival and departure times; guests or individuals included in motorcades.
A thorough, detail-oriented plan for the principal’s movements and critical to keeping the principal safe is knows as what?
1. Protective intelligence
2. An advance
3. An assessment
4. An after action report
- An advance
Key term for close protection
Team Leader
The individual ultimately reponsible for the protection of the principal on a given day or at a given event, the team leader directs the movement of the agents for that day or event.
Key term for close protection
Detail leader
The individual responsible for the overall detail, including standards and procedures.
Key term for close protection
Formations
Close protection teams will follow certain formations, depending on the location, size of an event, and other factors that may determine how close or far agents need to be from the principal.
Key term for close protection
“Loose” protection
Some situations such as small, private events or personal vacations where the principal does not want the close protection team to be obvious. This requires a more discreet style of protection.
Key term for close protection
Protective surveillance
Also known as covert protection, this has gained traction in recent years, as either an additional layer of security support to close protection details or a replacement for them.
Teams are typically set back, or at an outer perimeter of a principal’s location, to convey activity that is out of the norm for a particular event or area.
Key term for close protection
Security driver vs. protection agent
While many protection agents are cross-trained, and can double as a driver on a detail, it is important to ensure that one individual is designated as a driver for a particular day and/or assignment, and that the designated driver remains in the driver’s position while principals are at an event.
This is critical for a quick evacuation in case of an incident.
What are some key differences between private sector EP and government EP? Select all that apply:
1. Individuals providing protections are sworn officials
2. Agents are lawfully armed
3. Regular training and testing cycles are required
4. Clients are high profile
- Individuals providing protections are sworn officials
- Agents are lawfully armed
- Regular training and testing cycles are required
If an executive from the organization is kidnapped and made incapable of running the company, the organization can expect three types of financial losses, one of these is:
1. The costly loss of corporate revenue due to lost sales
2. The executive’s services will be lost either temporarily or permanently, which can be costly
3. The subsequent lawsuit from the executive’s family for the loss of the executive
4. The government fining the organization for failing to provide adequate security
- The executive’s services will be lost either temporarily or permanently, which can be costly
What determines an individual’s level of protection?
1. Individual’s salary
2. Individual’s seniority
3. Individual’s risk
- Individual’s risk
What is a background investigation?
A fact finding process of logically, methodically, and lawfully gathering and documenting information about an individual’s background
What are two broad reasons an employer should perform background screening and vetting
- Providing a safe work environment and protecting people
- Making the best hiring decision
What should be considered when determining individual competence?
- Knowledge, skills, and experience
- Roles and responsibilities
- Activities related to roles or functions
- Relevant experience
What are the three key elements of the vetting process?
- Identity verification
- Personal history verification
- Credentialing