Monday, March 1, 2010

VIP Protection

The term VIP as used in this report refers to any person designated as a very important person including government officials, corporate executives, foreign dignitaries or celebrities. This report provides guidelines regarding security procedures to be implemented during visits of any VIP. Implementation of these guidelines will reduce the executive's exposure to terrorist acts, criminal activity, and potential embarrassment. In most instances, these individuals will travel with their own security detail and you will want to coordinate on the best set of procedures to implement depending on the event and site. It should be viewed as a tool to assist in organizing, planning and controlling visits by company executives or other key personnel.

In some instances the visitor may prefer to maintain a low profile

Sunday, February 28, 2010

Vehicle Security

Vehicle searches are nearly always carried out by more than one person. One person should direct the search so that it is carried out methodically and systematically. He should also note down all of the items found and where they were located, and should check off each area of the vehicle as it is completed.

The simplest way to carry out a search is to break down the areas of examination into five stages:


Wednesday, February 3, 2010

Residential Security

The following general guidelines have been developed to help you protect yourself and your family from criminal and terrorist acts.To protect general residential security:

• Be alert for any signs of unusual activity that could indicate that the residence is under surveillance. The detection of potential threats is one of the most important safeguards for residential protection.

Thursday, January 28, 2010

Dependent Security

The objective of this report is to provide a diverse selection of security measures for consideration in protecting family members in a variety of situations. The guidelines offered here can be used to enhance security awareness of your existing location or can be used in planning for a relocation to another city, state or country.
It is essential that security precautions be dynamic, not static, in order to respond effectively to the ever changing level of risk. The adoption of a static, inflexible security posture is indicative of a disregard for the climate of risk and will almost certainly result in a lack of preparedness.

Saturday, January 2, 2010

Office Security

Conduct a basic security survey of compound, building(s) and office space. Photograph the overall area and all access points. Sketch all facility or office spaces noting access points, elevators, entrance areas, stairwells, fire exits, and all points of pedestrian or vehicle entrance, and control. Note the location of guards, the receptionist, and the general manager's office. Detailed attention should be given to the following:

Friday, January 1, 2010

Crisis Management

Since the beginning of time, people have encountered diverse catastrophic events that have resulted in great pain and suffering, and enormous loss of lives, and hundreds of billions of dollars in property damage. An analysis of these catastrophes discloses certain generic characteristics. Some, such as war, insurrection, and acts of terrorism, as in the case of the 11 September 2001 attack, are rooted in differences of political philosophies. Others, such as criminal acts and indus¬trial accidents, are the result of behavioral/societal problems or human error. Still others, such as earth¬quakes and violent storms and resulting floods, originate from natural phenomena over which people have no control.

Tuesday, September 29, 2009

Terrorist Group Profiles


Foreign Terrorist Organizations are foreign organizations that are designated by the Secretary of State in accordance with section 219 of the Immigration and Nationality Act (INA), as amended. FTO designations play a critical role in our fight against terrorism and are an effective means of curtailing support for terrorist activities and pressuring groups to get out of the terrorism business.

International Weapons


Most arms control efforts since World War II have been devoted to nuclear and other weapons of mass destruction or to heavy conventional weapons. Since the United Nations Secretary-General issued a supplement to his 1995 Agenda for Peace on the subject (January 1995), increasing attention has been given to the weapons that are actually producing the horrors witnessed in Africa, the Balkans, and other parts of the world. These weapons are small arms and light weapons (SA/LW), such as landmines, assault rifles (like the AK-47),

Interrogation Techniques


The objective of this report is to provide you with an understanding of possible techniques used by professionals trained in the art of extracting information from you. The information contained in this guide is based on scientific studies as well as experiences of both interrogators and their subjects.

Interrogation is simply the art of extracting information from an individual. Interrogation should not be confused with tactical questioning. I have been the subject of both. Once in Riyadh, Saudi Arabia I was pulled from a line in the airport just before boarding a flight to Bangkok and taken to a room in the terminal to determine how I got into the country. Apparently when I entered the country the

Espionage


If you work for any company that has products or services that are of value to a foreign or domestic spy, you are a target. While some of the techniques discussed here relate to collection of information in a foreign setting, the same techniques can also be used in this country. A spy is “anyone” who wants to steal protected information you have.

If you work in a highly valued target company, there is a very good chance that when you go to your favorite bar for happy hour or your favorite coffee shop that you can be compromised a variety of ways discussed in this report. If you establish a pattern and expose any type of vulnerability, you can be profiled and that can very effectively be used against you, your company and your country.

Terrorist Weapons


Semtex is clearly the explosive of choice by international terrorist groups for two reasons. First it is easily available and cost effective. It is considered by many to the best plastic explosive in the world. Semtex uses a crystalline high explosive, combined with a binder of a synthetic styrene-butadiene rubber binder which produces an odorless consistency of Silly Putty or Play Dough. Semtex was invented by Stanislav Brebera who studied at the Prague Technical University and Prague’s Military Technical Institute and in 1950 at the Synthesia chemical company. Although plastic explosives were initially developed

Money Laundering


The terrorist attacks of September 11 vividly illuminated the importance of anti-money laundering laws and controls. The attacks fostered an even greater recognition of the importance of anti-money laundering cooperation around the world. This recognition galvanized international cooperation and led to significant modifications to anti-money laundering laws. The framework of laws and regulations enacted during the last decade to address money laundering paid prompt dividends in the world community’s ability to trace the funds of those who finance international

Natural Disasters


We are unable to prevent natural phenomena, which often result in natural disasters, such as cyclones, hurricanes, typhoons, earthquakes, tornadoes, floods, lightning strikes, and volcanic eruptions. However, we can prepare and reduce the loss of life and property through planning.

Cyber Terrorism

As we enter 2010 and become increasingly reliant on technology, computers, and the internet to manage resources and operations in both the private and public sectors, we believe that cyber crime and cyber terrorism will become the "threat of the new millennium."


The FBI defines terrorism as "the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives." One description for cyber terrorism would be the FBI's definition of terrorism with an explanation of cyberspace immediately following.

Monday, September 28, 2009

Communication Systems


In considering any suggestions relative to Communication Systems, it should be understood that any system can be compromised and therefore by definition is not completely secure. Unless you are an Intelligence Officer or member of a Special Forces team using micro-burst technology to transmit coded communications through secure government satellites, you should consider that your communications have already been compromised. The objective of this report is to offer suggestions that you can consider in reducing your risk.

Satellite ground stations, microwave parabolic reflectors, and communications towers and supports should be located on rooftops, with limited access to the public. Where this is not possible, the equipment should be installed with fences and alarms. Closed circuit television (CCTV) with video recording capability should be considered and included where justified.

Aviation Security


The following section is intended for use primarily by the professional security staff of a company that owns and operates aircraft in foreign environment however; many of the following suggestions are applicable in the U.S. as well. Based on my personal experiences, I believe several of the suggestions offered here will also be useful to owners of general aviation aircraft desiring guidelines for improving the security of their investment.



Hostage Survival


Any traveler could become a hostage. The odds of that happening are extremely low when the number of travelers is compared to the number of people that have actually become a hostage. However, there is always a chance that a traveler could end up being in the wrong place at the wrong time. With this in mind, the traveler should make sure that his/her affairs are in order before they travel abroad. Items of particular importance to an individual in a hostage situation are an up to date will, insurance policy and a power of attorney for the spouse. If these items have been taken care of before departure, the employee will not have to worry about the family's welfare and the hostage can focus all of his/her efforts on the one thing of paramount importance and that is SURVIVAL!


Bomb Threat


The objective of this report is to help you develop an awareness of potential threats.

We definitely do not want to provide any information that may encourage you to take any unnecessary risk once you have developed an awareness of potential threats and have identified a potential threat. In addition, we do not want to provide any information in this report that may be used by any unauthorized persons who have obtained this report thinking they were going to learn how to make a bomb or that we were going to identify counter-measurers for a variety of explosive devices. Our objective is to help you develop an awareness of potential threats so you can move to a safe area, call law enforcement and let them deal with the threat.

Professional Comments & Reviews

"I appreciate your thoughtfulness, and it will be an honor to add your book to my personal library. I have had the opportunity to peruse it, and I look forward to reading it at length in the very near future. Semper Fidelis"

James L. Jones
General, U.S. Marine Corps
Commandant of the Marine Corps
National Security Advisor


"Thank you for sending me a copy of the security manual The Corporate Executive Survival Guide - International Operations. Your thoughtfulness during this great transition in democracy is inspiring."

John Ashcroft
United States Attorney General


"One of my users has purchased a copy of your Terrorist Groups - Profiles and Tactics resource. He has requested that the library make this available on our agency intranet, which is accessible to all NSA / CSS personnel".

Sallie Becker, Agency Librarian
National Security Agency



"In my past work as an Intelligence Analyst, and journalist, I have found your products to be helpful and exciting."

Krysta Davies
Intelligence Analyst



"It is my sincere wish that you enjoyed viewing the amphibious assault and all other related activities. Enclosed is a video memento of your participation in Amphibious Orientation Training 1996."

J. E. Ward
Brigadier General
U.S. Marine Corps Reserve



"This etching of the Iwo Jima flag raising is presented with our sincere appreciation for your outstanding support. Your loyalty and dedication is living testimony that "Once a Marine, always a Marine, Semper Fidelis"

Major M.D. Becker, Commanding
United States Marine Corps



Mr. Doyle: "I have forwarded your martial arts training videos to our Marine Security Guard School in Quantico." "I want to thank you for being our guest speaker and the troops have been informed that you are a "Marines Marine".

Gilberto Tores, Master Sergeant
United States Marine Corps



"On more than one occasion, Mr. Doyle provided invaluable assistance to me in overcoming delays that would have seriously impaired my ability to respond to in-kingdom problems."

Mr. P. J. Hillestad, Contracting Officer, U.S. Air Force
Peace Shield Program, Saudi Arabia


"The class truly enjoyed meeting you and learning from your thorough presentation. A week later, everybody asked me for a copy of the outline of your book that you left behind. I sincerely thank you for coming to speak to my class."

Zlatica I. Kralijevic, Professor - International Business
University of Houston - Graduate School



"Subsequent to last year's traumatic events on September 11th, your book will indisputably serve as a resource guide to our entire staff of security professionals. Thank you for keeping our city in your thoughts; I will share your book with my staff"

Lee P. Brown
Mayor, City of Houston



"I have thoroughly enjoyed reading the materials you sent me; and expect to refer to them for some time to come."

Dr. Ian Q. R. Thomas, author of "The Promise of Alliance - NATO and the Political Imagination"


"Your remarks are most encouraging and we are grateful to you for recognizing our efforts as you did. Please convey our thanks to your family as well. It is a pleasure to enclose one of my photographs which I have autographed for you."

Clarence M. Kelley, Director
Federal Bureau of Investigation



"In honor of The Director, Federal Bureau of Investigation The Honorable Louis J. Freeh, The Assistant Commandant of the Marine Corps and Mrs. Neal request the pleasure of your company at an Evening Parade on Friday, the twenty-fifth of July, Marine Barracks, Washington, D.C."

General Richard I. Neal, USMC
Assistant Commandant of the Marine Corps



"Mr. Doyle has worked on the Peace Shield Program with the Kingdom of Saudi Arabia for many years. Mr. Doyle is known for his professionalism and integrity."

Fawaz A. Kayal, Consul General
Royal Kingdom of Saudi Arabia



"We are satisfied with the success of your meeting with His Royal Highness, the Prince." "We truely believe that Mr. James Doyle, President of INTERCORP, has done a wonderful job for all of us in bringing our mutual interest together".

Sheikh Abdul Karim Al Sadoun
Al Eirad Trading & Contracting Co.


Following is the text from an official Saudi Embassy Christmas Card: "Best Wishes for a happy Christmas and a prosperous New Year." "So peace is on me the day I was born, the day that I die and the day that I shall be brought forth alive again. Such was Jesus son of Mary...","Surat Maryam, Holy Quran"

Mohamed R.Abu Al-Hamayel
Head of Consular Section
Royal Embassy Of Saudi Arabia
Washington, D.C.


"Mr. Doyle has a clear understanding of international business operations and related security considerations in Latin America."

Sergio A. Lopez, Director
America Hispania Magazine



"Thank you very much for your comments in the article regarding the kidnapping of Mr. Konno of Sanyo Video Components (USA) Corp which was carried in The Nikkei Weekly's Aug. 19 edition." We are sending you a copy of the article containing your comments.

Joshua Ogawa, Staff Writer
The Nikkei Weekly, Tokyo, Japan



Dear Mr. Doyle: " I would like to thank you for your contributions to and participation in the F.B. I., A.N.S.I.R. program."

Ed Shaw, Special Agent
F.B.I., Houston Division



"Dear Mr. Doyle: On behalf of the Diplomatic Security Service, U.S. Department of State, I would like to welcome you to the Overseas Security Advisory Council."

Tim Haley
Special Agent in Charge
Diplomatic Security Service
U.S. Department Of State