With the massive influx of transnational criminal organizations (TCO) being reported, law enforcement must anticipate the well documented criminality and violence associated with these entities. These TCO's pose a "clear and present danger" to U.S. law enforcement, officers of the court, witnesses and politicians, especially those engaged in the direct investigation, prosecution and incarceration/deportation of the members of these criminal organizations.
The tactics, techniques and procedures (TTP's) of these dangerous and violent groups are known to consist of multiple attackers armed with automatic weapons, explosive devices and other "military" and or "paramilitary" grade armaments, deployed in complex attacks. Most recently, authorities have compared these TCO's with terrorist organizations such as Al Qaeda, noting the similarities regarding depth of network, financial resources, ability to recruit and ruthlessness towards their adversaries.
Dignitary/Close Protection teams operating in "high threat" environments abroad, train, prepare for and anticipate these enemy TTP's. This training and preparation is mission and threat specific and in no way resembles "traditional" or basic dignitary and or executive protection training.
This 40 hour High Threat, LEO Protection Course, is designed to "bridge the gap" between the domestic protection environment and the preparation for elevated threats from highly skilled and capable actors. This course will provide participants with the mind and skill sets to effectively plan and execute high threat protective operation movements. Training objectives for participants include; execution of proper High Threat Advances (both site and route),
multi-configuration Motorcade Movements, Arrival/Departure Procedures, multi-configuration Walking Formations, utilization of tactical resources, "actions on contact" during all phases of operations and much more.
5 day (40 hours)
$850.00 pp | Limit 20 Participants
I. Introduction to High Threat (HT) Operations
1. Who warrants coverage
2. Vulnerability Assessments
3. Type of coverage (High/Medium/Low Profile)
4. Profile of a High Threat Protection Specialist
5. Weapons and gear considerations
6. Developing a Protective Detail
II. Situational Awareness/Counter Surveillance (CS) techniques
1. Establishing a baseline
2. Adversarial Tactics/Techniques/Procedures (TTP's)
3. Adopting "Red Cell" tactics
4. Utilizing protective intelligence for CS targeting
5. Identifying Anomalies
6. Heuristics
Ill. HT Advances Routes/Venues and Mission Planning
1. Recognizing "choke points" and Ideal Attack Sites
2. Establishing route "safe havens"
3. Identifying "hard points"
4. Developing "actions on contact" protocols
5. Deployment of "pre-posted" security
6. "Stash Vehicle" considerations
7. Implementation of "phase lines" for routes
IV. HT Formations
1. Assets assigned (size of protective detail)
2. Positioning relative to Threat Level/Terrain
3. Importance of "sector coverage" in HT environments
4. PSO/BG/AIC responsibilities
5. Shift/Team leader responsibilities
6. Flexibility of HT Formations
7. Implementation of "phase lines" and brevity codes on venue
V. Arrivals/Departures 1/2/3 vehicle motorcades
1. Types and considerations
2. Establishing "drop sites"/tactical considerations
3. Sector coverage on arrivals/departures HT environments
4. Establishing "phase lines" and "point of no return"
5. "Owning" drop sites; over watch and high ground coverage
VI. Motorcades 1/2/3 vehicle
1. Creating a "Secure Package"
2. Vehicle placement & traffic considerations in HT environment
3. Recognizing breaches in "normal" / baseline traffic movement
VII. Actions on Contact (AOC)
1. Attack on Principal (AOP) / Sound off ... cover .... evacuate
2. Attack on Motorcade (AOM) / Immediate action drills
3. Vehicle or motorcade "down" (actions on contact)
4. Principal Recovery & Extraction (PRE)
5. Response to Complex attacks
VIII. Special/Advanced Protocols and Procedures
1. Stages, Fence-lines, Podiums
2. Counter Assault Team (CAT) deployment High/Low profile
3. UAS (Unmanned Aerial Systems) Deployment and Defense
IX. Final Training Exercises
1. HT Principal movement profiles
2. HT Missions with Attack Response
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.