Bodyguard Introduction was written to expose an individual to the role of a bodyguard and responsibilities associated with that role. It emphasizes the need of education, skill development and experience. Within the chapter, harmful categories are outlined and explains the level of threat. Within this chapter, the reader will be exposed to verbal and gesture and color coded communications. Dedication and commitment are issues only an individual could determine.
Chapters II. III. IV.
Chapters “Standard Conduct, Job Skill Outline and Equipment” were addressed as necessary knowledge, skill requirements, mental condition exposes the different types of equipment utilized in this service. Within these chapters, an individual could prepare themselves in advance rather than being unprepared mentally or ability to provide.
Chapter, “Introduction to Terrorism” allows an individual to understand different types of threats being projected by other individuals and/or groups. This chapter offers a basic understanding associated with sociology and not psychology. In order to evaluate an individual through a physiological sense, that individual would need to be interviewed personally in order to assess the mental state or type of reaction the individual projects, which leads to profiling the subject. The use of psychology on large numbers such as a group fails to properly assess the group as a single entity. The reason for this is because each member in the group has their own set of personalities, agendas and thought patterns. Outlining these subjects will be difficult to accomplish and increases time to access. The element of time is not available when it comes to protecting a client from individuals and/or groups that promote harm against the client or who has established a confirmed threat against the client and their family.
Sociology however offers a basic understanding on agendas and abilities associated with a group's social structure. Unfortunately, an individual providing service in protection will not have the ability or time to attend years of education on the subjects of sociology or psychology and from this reason, a basic understanding to the subject was expressed.
Methods on how terrorist organizations retain intelligence and how they apply planned actions are explored. Article included shows terrorism development from childhood. All articles show locations for retrieving and viewing further. Elements, characteristics, procedures and operations are explored with methods and possible abilities. Finally, intelligence research centers were written to expand the knowledge of individuals who are performing assignments.
The chapter, “Gathering Personal Information” deals directly with the client and those in close proximity of the client. This chapter offers an understanding on why personal information is required and expresses concerns relating to the client and their family. An individual providing a service in protection should retain any and all personal information on their client before attempting to provide a service that has increasing danger. Within this chapter, data sheets are outlined with solid reasons and follow a single format that will insure retaining proper information in a formatted setting. This will allow a security provider to outline proper security measures and secondary options while minimizing any possible oversight on any type of critical information. Formats also cover spouse, children, chauffeur, secretary, servants and a fitness instructor.
The “On-Line Information” chapter was written to expose areas of retaining information and intelligence including areas of increasing knowledge. Since the role of a bodyguard is to protect a client from either established threats or possible threats, a bodyguard should have a direction on retaining intelligence against individuals and/or groups that could pose a threat against the client. Information and intelligence is only a fraction to the equation. To finalize the need, an individual should have the ability to research within the security and intelligence fields to increase their understanding on new protocols and methods pertaining to current threats.
The chapter “Zone Security” was written exposing methods of providing security barriers around the client and property. These methods incorporated situational threats exposing the need and reasons why zone security is an important issue to address. Zoning is also broken down to individual assignment and responsibilities.
Chapters IX. X. XI.
"Central Command, Principle Detail and Advance Branch" chapters were written to outline their function and individual responsibilities. These chapters exposed separate requirements relating to performance and included key areas of assignments pertaining to all members of the detail.
The "Safe House" chapter was written to expose reasons why they are needed and how to incorporate the use of emergency facilities in a security plan. From this chapter, the individual could understand key subjects relating to the type of conditions along with preparing the need. Locations on hazards and sabotage is expressed with caution. Methods of retaining a location were expressed with concepts like, "Favorable / Unfavorable Circumstances," "Area within a location" and "Distance of travel and time."
"Vehicle Inspection" was written to expose the possible threats of hazards and sabotage. Since the client is in danger from possible unknown individuals, the risk of harm increases while the client is away from their safe haven. Locations within a vehicle were broken down along with the inspection order. All outline areas of possible concerns was expressed with reasons including secondary security options.
The chapter, “Third Party Contact” outlines the need to develop and incorporate databases of secured and unsecured contacts. While this profession offers the greatest measure of supplying security, the need to incorporate others will become a possibility. This includes accommodating the client’s request in providing transportation and lodging. This chapter offers direction on retaining intelligence on third parties and expands to personnel employment background and interviewing methods.
Finally, the chapter “Suspicious Packages” was written to expose the danger of common packages such as envelopes and boxes being received either in a business setting or personal sense. Methods on examining the possible foretold signs on a package including the contents within was outlined. The need to isolate any package was expressed as designating package areas and explains how to incorporate and develop this area. Anyone attempting to inspect a package that may be suspicious should have increased knowledge on evaluating the level of threat associated with the package and should never attempt to expose the contents without having proper training and experience. Chemical agents and electronic components was exposed and shown as a means of delivering hazard and/or death.
The "Index" was established for quick reference on a subject.