Sunday, February 28, 2010

Vehicle Security

Vehicle searches are nearly always carried out by more than one person. One person should direct the search so that it is carried out methodically and systematically. He should also note down all of the items found and where they were located, and should check off each area of the vehicle as it is completed.

The simplest way to carry out a search is to break down the areas of examination into five stages:


1. Exterior bodywork

2. Underneath

3. Interior

4. Trunk

5. Engine

It is critical that you search logically and systematically so that no part of the vehicle is overlooked.

Planning:

An experienced searcher will also ask himself six questions to ensure that he has prepared thoroughly:

1. Who is being searched:

Will the owner of the vehicle be there?

Will he mind?

He may need to be calmed down, especially if the search reveals nothing.

Note his appearance and attitude; are they suspicious?

2. Why is the search taking place?

Has the car been deliberately identified as suspect or is it just a deterrent search?

3. What am I looking for?

Are you trying to discover explosives, incriminating letters, arms, ammunition, maps, money, drugs, detonators, radio equipment? Or are you just looking for anything of interest? This will dictate how thoroughly you search.

4. Where should the search take place?

Does the vehicle need to be moved to a garage to make the search easier, for instance to look underneath or in the engine?

5. When is the search taking place?

A search carried out in the dark could result in tragedy if you fail to notice a trip wire. If in doubt, postpone the search until morning.

6. How is the search to be carried out?

What is your plan of action? Make sure you do it systematically and methodically, so as not to miss any part of the vehicle. The degree of thoroughness will depend on the amount of suspicion attached to the vehicle, and the level of sophistication and concealment techniques of the terrorist.

Quick Tips:

1. Look for evidence of recent activity.

2. Ask yourself where you would hide something.

3. Look above and below as well as at eye level.

4. Keep thinking where the spaces are and how to reach them.

5. Have spare or protective search clothing available if necessary.

6. Strong smells of talc or perfume may be hiding the powerful smell of explosives.

7. Get the driver to open the hood and the trunk; don't do it your self!

8. Look carefully at the driver - is he or she nervous.

9. Does the vehicle look right. Do the carpets fit properly or have they been moved recently.

10. A trigger switch could be placed anywhere in the car to activate if something is moved.

11. A heat activated device could be attached to an exhaust system.

Establishing a checkpoint:

1. The layout should consist of one sentry forward, one rear, one standing in the road to stop traffic and one covering the vehicle occupants.

2. Stop the vehicle and check its registration against the wanted car list. Check the drivers license.

3. Ask the driver for his registration number and where the spare tire is; if he has to look before answering he may be driving a stolen vehicle.

4. If you notice something suspicious; like a gas cap missing from the car, you may decide to conduct a thorough search.

5. Start with the outside of the vehicle and keep the owner with you to watch the search.

6. While one person searches the car with the owner, another searcher covers him at all times.

7. After thoroughly searching the outside, search the underneath of the car: look for fresh paint, disturbed underseals and altered exhaust systems.

8. Next search the trunk: get the owner to open the trunk and any luggage inside. Take out the carpet and spare tire.

9. Grenades can easily be concealed in the space between the trunk carpet and the floor or sides.

10. Next search the engine, again getting the driver to open the hood and don't forget the filters.

11. Searching the driver and passenger seat area: make sure you reach unto all the cavities.

12. If you find anything suspicious, leave it where it is, arrest the driver and alert an explosives team.

13. Once you have found something suspicious, search the suspect thoroughly including his/her hair.

Note: These are only a few examples of things you may want to consider while searching a passenger vehicle however the same thoroughness and caution can be applied to any means of transportation you consider suspect. If searching a motorcycle, you may want to consider the following:

1. False partitions in a gas tank.

2. Weapons concealed in handgrips.

3. Anything concealed in tubular framing.

4. Anything concealed under the seat.

5. Electrical devices connected to lights and horns.

6. Wires taped anywhere on the bike.

Vehicle Travel Guidelines

Threats of terrorism and other criminal incidnets are serious problems involving all aspects of security management. Effective management dictates that available resources be used wisely and concentrated on security weak points. Terrorists and criminals are very quick to identify the security vulnerabilities of business, family, and pleasure travel. At their best, protection strategies dealing with vehicles and travel are perhaps the hardest to formulate, and the advantage tends to be with the terrorist. Current statistics indicate that the greatest danger from acts of terrorism occurs while traveling to or from the office and just before reaching his/her destination.

The inherent security problems of passenger vehicle travel are many. Vehicles are easily recognized by year, make, and model, and the trained terrorist can accurately assess any protection modifications and security devices. Using adequate resources, vehicles can be discreetly followed; therefore, making possible repeated dry runs of potential attacks with very low risk of detection. Under these conditions, different methods of attack can be formulated and tested until success is ensured. While traveling in a passenger vehicle, the traveler has limited protection resources upon which to rely and often is dependent on fixed security manpower. This makes it easier for terrorist groups, which are geared to mobility, to ensure numerical superiority.

The attack potential against the executive in travel rests heavily on psychological instability and human weakness. The shock of surprise attack is greatest at points of changing surroundings, crossroads, and when entering or exiting vehicles. These are situations of constant change and points of activity where the executive has a tendency to be mentally off balance. Vehicles are often left in driveways, on streets, at service centers, and other isolated areas with no form of control or protection, allowing easy access to terrorists. Through illegal entry to the vehicle, the terrorist can gain a number of attack points; sabotage with the intent to maim and injure, sabotage with the intent of execution, and sabotage to ensure the success of future attacks. These psychological factors make the vehicle the ideal place to apply scare tactics, warnings, and gain initial control of the executive.

Even though travel problems provide the greatest number of security and psychological variables, there are actions and policies that can be developed to minimize the executive's risk and complicate the terrorist's plans. The basic travel policy can be divided into three areas: (1) Normal Travel Procedures, (2) Vehicle Equipment, and (3) Vehicle Defense Strategy.

CARJACKING

CARJACKING has become one of the most prevalent crimes in many parts of the world. Most carjackings occur for the sole purpose of taking the car; it is a crime without a political agenda.

You can protect yourself by becoming familiar with the methods, ruses, and locations commonly used by carjackers.

AVOIDANCE

The first step to avoiding an attack is to stay alert at all times and be aware of your environment. The most likely places for a carjacking are:

• High crime areas

• Lesser traveled roads (rural areas)

• Intersections where you must stop

• Isolated areas in parking lots

• Residential driveways and gates

• Traffic jams or congested areas

Learn to avoid these areas and situations if possible. If not, take steps to prevent an attack.

In traffic, look around for possible avenues of escape. Keep some distance between you and the vehicle in front so you can maneuver easily if necessary—about one-half of your vehicle’s length. (You should always be able to see the rear tires of the vehicle in front of you.)

When stopped, use your rear and side view mirrors to stay aware of your surroundings. Also keep your doors locked and windows up. This increases your safety and makes it more difficult for an attacker to surprise you.

Accidents are one ruse used by attackers to control a victim. Following are common attack plans:

• The Bump — The attacker bumps the victim’s vehicle from behind. The victim gets out to assess the damage and exchange information. The victim’s vehicle is taken.

• Good Samaritan — The attacker(s) stage what appears to be an accident. They may simulate an injury. The victim stops to assist, and the vehicle is taken.

• The Ruse — The vehicle behind the victim flashes its lights or the driver waves to get the victim’s attention. The attacker tries to indicate that there is a problem with the victim’s car. The victim pulls over and the vehicle is taken.

• The Trap — Carjackers use surveillance to follow the victim home. When the victim pulls into his or her driveway waiting for the gate to open, the attacker pulls up behind and blocks the victim’s car.

If you are bumped from behind or if someone tries to alert you to a problem with your vehicle, pull over only when you reach a safe public place.

If you are driving into a gated community, call ahead to have the gate opened. Otherwise wait on the street until the gate is open before turning in and possibly getting trapped.

Think before stopping to assist in an accident. It may be safer to call and report the location, number of cars involved, and any injuries you observed.

You can avoid becoming a victim. Ruses and methods, as well as the types of cars most often targeted, differ from country to country. Talk with the security manager at your office about security guidelines as they may relate to use of company vehicles and your personal vehicle.

In all cases keep your cell phone or radio with you and immediately alert someone regarding your situation.

DURING A CARJACKING

In most carjacking situations, the attackers are interested only in the vehicle. Try to stay calm. Do not stare at the attacker as this may seem aggressive and cause them to harm you.

There are two options during an attack— nonresistive, nonconfrontational behavior and resistive or confrontational behavior. Your reaction should be based on certain factors:

• Type of attack

• Environment (isolated or public)

• Mental state of attacker (reasonable or nervous)

• Number of attackers

• Weapons

• Whether children are present

In the nonconfrontational situation, you would:

• give up the vehicle freely.

• listen carefully to all directions.

• make no quick or sudden movements that the attacker could construe as a counter attack.

• always keeps your hands in plain view. Tell the attacker of every move in advance.

• make the attacker aware if children are present. The attacker may be focused only on the driver and not know children are in the car.

In a resistive or confrontational response, you would make a decision to escape or attack the carjacker. Before doing so, consider:

• the mental state of the attacker.

• possible avenues of escape.

• the number of attackers; there is usually more than one.

• the use of weapons. (Weapons are used in the majority of carjacking situations.)

In most instances, it is probably safest to give up your vehicle.

AFTER THE ATTACK SAFETY

Always carry a cell phone or radio on your person.

If you are in a populated area, immediately go to a safe place. After an attack or an attempted attack, you might not be focused on your safety. Get to a safe place before contacting someone to report the incident.

REPORTING THE CRIME

Describe the event. What time of day did it occur? Where did it happen? How did it happen? Who was involved?

Describe the attacker(s). Without staring, try to note height, weight, scars or other marks, hair and eye color, the presence of facial hair, build (slender, large), and complexion (dark, fair).

Describe the attacker’s vehicle. If possible get the vehicle license number, color, make, model, and year, as well as any marks (scratches, dents, damage) and personal decorations (stickers, colored wheels).

The golden rule for descriptions is to give only that information you absolutely remember. If you are not sure, don’t guess!

Avoidance is the best way to prevent an attack. Use your judgment to evaluate the situation and possible reactions. Know safe areas to go to in an emergency. Always carry your cell phone or radio.

Nonconfrontation is often the best response. The objective is not to thwart the criminal but to survive!

Vehicle Equipment Checklist

• The executive vehicle designed to meet the terrorist or criminal threat in a high threat area should be a hardtop model with the following special equipment: (a) inside hood latch, (b) locked gas caps, (c) inner escape latch on trunk, (d) steel belted radial tires with inner tire devices that permit movement even with a flat tire, (e) radiator protection, (f) disk brakes, and (g) an anti-bomb bolt through the end of the exhaust pipe.

• Positive communications can be ensured with a two way radio or a car telephone.

• It is recommended that the executive vehicle designed to meet the terrorist or criminal threat carry the following safety equipment: (a) fire extinguisher, (b) first aid kit, (c) flashlight, (d) two spare tires, (e) large outside mirrors, and (f) a portable high intensity spotlight.

• For additional protection, the vehicle should have an alarm system with an independent power source (an additional battery).

Travel Procedures Checklist

• The avoidance of routine times and patterns of travel by executives is the least expensive security strategy that can be utilized. The selection of the route should be at the discretion of the executive, not of a chauffeur. Always restrict travel plans to a need to know basis.

• Avoid driving in remote areas after dark and keep to established, well traveled roads.

• In high risk areas or when individuals are considered attractive targets, consideration should be given to executives and drivers being trained in anti-terrorism strategy and defensive driving. Establish responsibilities and develop contingency plans.

• There should be a simple duress procedure established between the executive and drivers. Any oral or visual signal will suffice (i.e., something that the executive or driver says or does only if something is amiss).

• Never overload a vehicle, and all persons should wear seat belts.

• Always park vehicles in parking areas that are either locked or watched and never park overnight on the street. Before entering vehicles, check for signs of tampering.

• When using a taxi service, vary the company. Ensure that the identification photo on the license matches the driver. If uneasy for any reason, simply take another taxi.

• When attending social functions, go with others, if possible.

• Avoid driving close behind other vehicles, especially service trucks, and be aware of activities and road conditions two to three blocks ahead.

• Keep the ignition key separate and never leave the trunk key with parking or service attendants.

• Before each trip, the vehicle should be inspected to see that (a) the hood latch is secure, (b) the fender wells are empty, (c) the exhaust pipe is not blocked, (d) no one is in the back seat or on the floor, and (e) the gas tank is at least three quarters full.

• Establish a firm policy regarding the carrying and use of firearms. Local laws may prohibit firearms.

Defense Strategy Checklist

Always be alert to possible surveillance; if followed, drive to the nearest safe location, such as police stations, fire stations, or shopping center and ask for help. Carry a mini cassette recorder in the car to dictate details of a suspect surveillance car such as color, make, model, license plate, description of occupants, etc. It is difficult to make such detailed notes while driving.

• Where feasible, drive in the in the inner lanes to keep from being forced to the curb.

• Beware of minor accidents that could block traffic in suspect areas; especially crossroads because they are preferred areas for terrorist or criminal activities as crossroads offer escape advantages.

• If a roadblock is encountered, use shoulder or curb (hit at 30 45 deg. angle) to go around, or ram the terrorist or criminal blocking vehicle. In all cases, do not stop and never allow the executive's vehicle to be boxed in with a loss of maneuverability.

• Blocking vehicles should be rammed in a non-engine area, at 45 deg., in low gear, and at a constant moderate speed. Knock the blocking vehicle out of the way!

• Whenever a target vehicle veers away from the terrorist vehicle, it gives adverse maneuvering room and presents a better target to gunfire.

Family and Company Cars

• Purchase or lease a car that blends in well with the local car environment. Remember Low Profile!

• Consider installation of burglar alarm on car consistent with risk level.

• Make sure gas cap, spare tire, and engine compartment are lockable in the interest of good safety and security.

• Always have the fuel tank at least half full.

• Keep vehicle(s) locked at all times.

• Never park your vehicle on the street for long periods of time.

• Keep your vehicle(s) housed in a garage.

• Make sure that you have both right and left side rear view mirrors. Visibility around your vehicle is critical.

• Do not leave registration papers in your car.

• If legal to do so, have your car license plate registered to a Post Office Box rather than to your home or office. List the P.O. Box to your office.

• Keep extra water and oil in the trunk.

• Do not use stickers or plates.

• Keep emergency equipment in the trunk, flashlight, flares, fire extinguisher, first aid kit, etc.

• If possible, install a communication device, such as a two way radio or telephone in your car.

Auto Travel Countermeasures

• Potential victims of kidnapping and assault are probably most vulnerable when entering or leaving their home or office.

• Never enter a car without checking the rear seat to insure that it is empty.

• Do not develop predictable patterns during the business day or during free time. For example, do not leave home or the office at the same time and by the same route every day.

• Do not have a standard tee off time for golf, tennis, and hand ball, etc.

• If possible, exchange company cars, swap with co workers occasionally.

• Know the location of police, hospital, military, and government buildings. Ascertain when they are open and which ones are 24 hour operations. These areas can provide a safe haven along normal transportation routes.

• Even the slightest disruption in travel patterns may disrupt a surveillance team sufficiently for them to tip their hand or abandon their efforts.

• Avoid trips to remote areas, particularly after dark. If it is essential to go into such an area, travel in a group or convoy and advise trusted personnel of your itinerary.

• Select well traveled streets as much as possible.

• Keep vehicles well maintained at all times, including a useable spare tire.

• Install additional rear view mirrors so passengers may see what is behind.

• If chauffeur driven, consider riding up front next to the driver sometimes, in keeping with the low profile concept.

• Chauffeurs and high risk personnel should be trained in offensive and evasive driving techniques.

• When driving, keep doors and windows locked.

• Be constantly alert to road conditions and surroundings, to include possible surveillance by car, motorcycle, or bicycle. All passengers should be vigilant.

• If surveillance or some other danger is detected, drive to the closest safe haven, such as police station, hospital emergency room, fire station, etc., lock your car and go inside. Advise authorities as appropriate.

• When traveling, pre plan your route and one alternate.

• Be prepared for local environmental conditions (snow, rain, etc.).

• Never pick up hitchhikers.

• Whenever possible, drive to the center of the road, especially in rural settings, to avoid being forced off the road.

• Remain a safe distance behind the vehicle ahead to allow space for avoidance maneuvers, if necessary.

• Check side/rear view mirrors routinely.

• Carry 3 x 5 cards with important assistance phrases printed on them to assist with language problems.

• Always carry appropriate coin denomination for public phones. Practice use of public telephones.

• Report as appropriate all suspicious activity to the company security contact, embassy or consulate, or local police as soon as possible.

• Consider keeping a small hand held cassette recorder in glove box at all times, descriptions of suspicious persons, activities, license plate numbers, etc., can be dictated while driving. It's impossible to make notes while driving or in stressful situations.

• Never leave identifying material or valuables in the vehicle.

If surveillance is suspected consider the following actions:

• Divert from originally intended destination, make a few turns to see if the suspect still persists.

• Immediately determine any identifying data that you can observe including make, color of car, license number, number and description of occupants.

• Remember; do not panic if surveillance is confirmed. Surveillance teams are normally neither trained nor have the mission to assault the potential target. Their job is to set up a future attack.

Vehicle Parking

• Always lock the vehicle, no matter where it is located.

• Do not leave the car in the care of a valet parking service such as hotel, restaurant or club.

• Require chauffeurs to stay with the car.

• Avoid leaving the vehicle parked on the street overnight.

• Never exit vehicle without checking the area for suspicious individuals. If in doubt, drive away.

Professional Comments & Reviews

"I appreciate your thoughtfulness, and it will be an honor to add your book to my personal library. I have had the opportunity to peruse it, and I look forward to reading it at length in the very near future. Semper Fidelis"

James L. Jones
General, U.S. Marine Corps
Commandant of the Marine Corps
National Security Advisor


"Thank you for sending me a copy of the security manual The Corporate Executive Survival Guide - International Operations. Your thoughtfulness during this great transition in democracy is inspiring."

John Ashcroft
United States Attorney General


"One of my users has purchased a copy of your Terrorist Groups - Profiles and Tactics resource. He has requested that the library make this available on our agency intranet, which is accessible to all NSA / CSS personnel".

Sallie Becker, Agency Librarian
National Security Agency



"In my past work as an Intelligence Analyst, and journalist, I have found your products to be helpful and exciting."

Krysta Davies
Intelligence Analyst



"It is my sincere wish that you enjoyed viewing the amphibious assault and all other related activities. Enclosed is a video memento of your participation in Amphibious Orientation Training 1996."

J. E. Ward
Brigadier General
U.S. Marine Corps Reserve



"This etching of the Iwo Jima flag raising is presented with our sincere appreciation for your outstanding support. Your loyalty and dedication is living testimony that "Once a Marine, always a Marine, Semper Fidelis"

Major M.D. Becker, Commanding
United States Marine Corps



Mr. Doyle: "I have forwarded your martial arts training videos to our Marine Security Guard School in Quantico." "I want to thank you for being our guest speaker and the troops have been informed that you are a "Marines Marine".

Gilberto Tores, Master Sergeant
United States Marine Corps



"On more than one occasion, Mr. Doyle provided invaluable assistance to me in overcoming delays that would have seriously impaired my ability to respond to in-kingdom problems."

Mr. P. J. Hillestad, Contracting Officer, U.S. Air Force
Peace Shield Program, Saudi Arabia


"The class truly enjoyed meeting you and learning from your thorough presentation. A week later, everybody asked me for a copy of the outline of your book that you left behind. I sincerely thank you for coming to speak to my class."

Zlatica I. Kralijevic, Professor - International Business
University of Houston - Graduate School



"Subsequent to last year's traumatic events on September 11th, your book will indisputably serve as a resource guide to our entire staff of security professionals. Thank you for keeping our city in your thoughts; I will share your book with my staff"

Lee P. Brown
Mayor, City of Houston



"I have thoroughly enjoyed reading the materials you sent me; and expect to refer to them for some time to come."

Dr. Ian Q. R. Thomas, author of "The Promise of Alliance - NATO and the Political Imagination"


"Your remarks are most encouraging and we are grateful to you for recognizing our efforts as you did. Please convey our thanks to your family as well. It is a pleasure to enclose one of my photographs which I have autographed for you."

Clarence M. Kelley, Director
Federal Bureau of Investigation



"In honor of The Director, Federal Bureau of Investigation The Honorable Louis J. Freeh, The Assistant Commandant of the Marine Corps and Mrs. Neal request the pleasure of your company at an Evening Parade on Friday, the twenty-fifth of July, Marine Barracks, Washington, D.C."

General Richard I. Neal, USMC
Assistant Commandant of the Marine Corps



"Mr. Doyle has worked on the Peace Shield Program with the Kingdom of Saudi Arabia for many years. Mr. Doyle is known for his professionalism and integrity."

Fawaz A. Kayal, Consul General
Royal Kingdom of Saudi Arabia



"We are satisfied with the success of your meeting with His Royal Highness, the Prince." "We truely believe that Mr. James Doyle, President of INTERCORP, has done a wonderful job for all of us in bringing our mutual interest together".

Sheikh Abdul Karim Al Sadoun
Al Eirad Trading & Contracting Co.


Following is the text from an official Saudi Embassy Christmas Card: "Best Wishes for a happy Christmas and a prosperous New Year." "So peace is on me the day I was born, the day that I die and the day that I shall be brought forth alive again. Such was Jesus son of Mary...","Surat Maryam, Holy Quran"

Mohamed R.Abu Al-Hamayel
Head of Consular Section
Royal Embassy Of Saudi Arabia
Washington, D.C.


"Mr. Doyle has a clear understanding of international business operations and related security considerations in Latin America."

Sergio A. Lopez, Director
America Hispania Magazine



"Thank you very much for your comments in the article regarding the kidnapping of Mr. Konno of Sanyo Video Components (USA) Corp which was carried in The Nikkei Weekly's Aug. 19 edition." We are sending you a copy of the article containing your comments.

Joshua Ogawa, Staff Writer
The Nikkei Weekly, Tokyo, Japan



Dear Mr. Doyle: " I would like to thank you for your contributions to and participation in the F.B. I., A.N.S.I.R. program."

Ed Shaw, Special Agent
F.B.I., Houston Division



"Dear Mr. Doyle: On behalf of the Diplomatic Security Service, U.S. Department of State, I would like to welcome you to the Overseas Security Advisory Council."

Tim Haley
Special Agent in Charge
Diplomatic Security Service
U.S. Department Of State