Bodyguard Principles

 

Table of Contents


 

 

Home

Frank Sciacca Jr.

ASO Training

Research Links

General Links

Contact

 

Inspiration……………………...…………...………………….…………..……..….…….................................i

Forward……………...…………...……………………..…………………..….…...……...................................iii

I: Bodyguard Introduction…………………...……..………………………………..…...................................1

        Harmful Categories. - Assassinations. - Kidnappings. - Physical Harm. -Embarrassment. -  Branches.

        - Responsibilities. - Threat Assessment. - Information Gathering. - Zone Barriers. - Security Survey.

        - Communication. - Verbally Spoken. - Verbally Coded. - Color Coded Signs - Coded Call Signs -

        Gesture Signs. - Individual Responsibilities. - Performance.

II: Standard Conduct……………………….…………………………………………........................................15

       Behavior. - What’s Acceptable Behavior. - What’s Not Acceptable Behavior. - Mental Mindset. - Appearance.

       - Performance Attire. - Stand-By Attire.

 III: Job Skill Outline…….……………………………………….......................……………………................29

       General Investigation Skills. - Background Investigations - Undercover Investigations - Crime Scene

       Investigations - Computer Forensic Investigations - Advance Electronics - Information Brokering

       - AIC Capabilities / Responsibilities. - Percentage Skills Breakdown. -  Skill Breakdown Format -

       Drivers Capabilities / Responsibilities. - Members Capabilities / Responsibilities.

IV: Equipment……………………...………………………………………..………….......................................45

        General Equipment. - Additional Equipment. - Individual Branch Equipment. - Central Command

        Branch Equipment. - Principle Detail Branch Equipment. - Advance Branch Equipment. 

V: Introduction to Terrorism……………………...…………………………..………......................................61

       Sociology Definitions. - Sociology Basics. - War Games. - Arab Children Receiving Military

       Training.- The Mind Has No Firewall. - Terrorism. - Terrorism Definitions - History of Terrorism. -

       Current Day Terrorism. - Elements of Terrorism. - Method of Statements. - Activist / Sleepers. -

       Characteristics of a Terrorist. - Concept of Religion. -  Assessing. – Procedures of a Terrorist. -

       Portraying a Terrorist. - Operations of Terrorism. - Possible Motives. Social Status. - Political

       Status. - Jealousy / Vengeance. - Intelligence Centers.

VI: Gathering Personal Information………………………………………......…..…........................................89

       Client’s Information. - Open Statement To Client. - Client’s Breakdown Sheet. - Client’s Data

       Sheets. - Additional Questions for the client. - Spouse’s Information. - Spouse’s Breakdown

       Sheet - Spouse’s Data Sheets. - Children’s Information. - Children’s Breakdown Sheet. - Child’s

       Data Sheets. - Chauffeur’s Information. - Chauffeur’s Breakdown Sheet. - Things to Remember. -

       Chauffeur’s Data Sheets. - Additional Information. - Secretary / Servant Information. - Secretary /

       Servant Breakdown  Sheet - Secretary / Servant Data Sheets. Secretary / Servant Additional

       Information. – Fitness Instructor’s Information. - Fitness Instructor’s Breakdown Sheet. - Fitness

       Instructor’s Data Sheets.

VII: On-Line Information……………….....…………………..……………………...........................................133

        Categories for Information. - Public Records. - Information Brokers. - Intelligence / Research.  

        Search Engines. - Public Record Locations. - Information Brokering Locations. - Intelligence

        Research Locations. - Search engine Locations.

VIII: Zone Security…………………………..………………………………….……..........................................143

       Zone One Barrier. - Zone Two Barriers. - Zone Three Barriers. - Client’s Zone One. - Zone One

       Breach - Action Recapture in Zone One. - Client’s Zone Two. - Action Recapture in Zone Two. -

       Property Zones One and Two. - Action Recapture Within Property Zones. - Zone Three. -

       Zone Clearance.

IX: Central Command Branch…………………………………………....…………..........................................153

       Base Station - Station Stand-by Mode. - Vehicle. - Weather. - Traffic. - Zone Security. - Updating

       Intelligence - Central Command AIC Responsibilities. - Central Command Member. - Safe Haven

       Protocol. - Note.

X: Principle Detail………………………………………………………….……..…...........................................163

       Principle Detail AIC Responsibilities. - Driver Responsibilities. - Principle Detail Members. - Vehicle.

       Sabotage - Vehicle Disabling Locations. - Explosive Devices. - Listening Devices. - Tracking

       Devices.

XI: Advance Branch……………………….…………………………………….…….........................................171

       Obtaining Vehicles. - Securing Locations. - Routes and Activities. - Hazard Locations. -

       Emergency Locations. - Hosting location. - Tagging. - Advance AIC Responsibilities. - Driver’s  

       Responsibilities. - Driver’s Security Sweep. - Advance Members. - Advance Members Activity.

XII: Safe House…………………...……………………....……………………….….........................................185

      Favorable Circumstances. - Unfavorable Circumstances. - Area Within A Location. - Distance of

      Travel and Time. - Example. - Secondary Safe-Haven Location. - Coding. - Safe House Locations. -

      Documenting Safe House Area. - Safe House Hazard and Sabotage. - Hazard / Sabotage

      Locations. - Note.

XIII: Vehicle Inspection…………………………………………………...…………........................................199

       Vehicle Inspection Order. - Engine and Underbody Locations. - Mid Section Underbody Locations. -

       Rear Section Vehicle Locations. - Trunk Compartment. - Vehicle Interior Inspection. - Interior

       Section One Inspection. - Interior Section Two Inspection. - Interior Section Three Inspection -

       Preparing the Vehicle. - Things to Check. - Indicators. - Vehicle Secondary Security Options. 

XIV: Third Party Contacts………………………………….….……………………..........................................221

       General Database. - Secured Database. - Limousine Company. - Stated Clause. - Stated Clause

       Reason. - Background Methods - Interviewing Method. - Employment History. - Previous

       Residence. - Personal Reference. - Third Party Responsibilities. - Prior to Mission. -

       Private Air Charter.

XV: Suspicious Packages…………………………..…………………………………........................................237

       Foretold Signs. - Equipment. - Designated Package Area. - Designated Package Area Preparation. -

       Chemical Area Preparation. - Explosion Area Preparation. - Common Packages. - Envelopes

       4” x 9.5”. - Checking Method 4” x 9.5”. - Flaw and Barriers 4 x 9.5”. - Padded Envelopes

       7” x 9.5”. - Inspecting 7” x 9.5”. - Plastic Barriers. - Plastic Barrier Method. - First Opening

       Method. 7” x 9.5” - Second Opening Method 7” x 9.5”. – Envelopes9” x 12” or Larger. -

       Plastic Barriers. - Envelope Flaws 9” x 12”. - First Opening Method 9” x 12”. -

       Second Opening Method 9” x 12”. - Padded Envelopes 9” x 12”. - Cardboard Inserts. 

      - Opening Method 9” x 12”. Priority / Next Day Envelopes. - Priority / Next Day Envelope Flaws.

      - Opening Method Priority / Next Day Envelopes. - Box with Folding Flaps. - First Opening

      Method Box With Flaps. - Second Opening Method Box With Flaps. - Box with Removable Lids. -

      Opening Method Box With Lids. - Suspicious Package Conclusion.

XVI: Conclusion……………………..…………….………………………..………….......................................263

Index………….…………………………………………….……………………..…...................…....................270

 

Return to Book        Book Reviews        Conclusion        Book Sale

 

Home     Frank Sciacca Jr.    ASO Training    Research Links    General Links    Contact

 

Terms and Conditions

© Copyright 2006 Bodyguard Principles. All rights reserved and

all information in this website is deemed reliable, but not guaranteed.