The service of a personal protection specialist also known as a bodyguard, is a decision that a potential client may consider if they or the lives of their family are threatened in some manner. This notion of threat could be based on the difference of opinion or emotions directed either personally or business from individuals to extremist groups. While the notion of threat concerns the client, a bodyguard will evaluate the level of threat into harmful acts and isolate the areas and conditions which could expose the client to potential harm.
The role of a personal protection specialist (aka) bodyguard, is like following a formula or blueprint. There are several components in place in order to provide and accomplish assignments of safeguarding principles with a successful outcome. Since a bodyguard's engagement is to safeguard the welfare of the principle, family and/or property, areas of education, skill development and experience are subjects that require constant growth. From this, an individual providing a service as a personal protection specialist (aka) bodyguard, will develop the correct mind set, appearance and comprehend functions. This course of expansion becomes mandatory in order to accumulate information and intelligence relating to the threats concerning the principle.
Understanding the type of role a bodyguard represents, "Bodyguard Principles" was written to expose methods, concepts, functions and individual responsibilities along with situational examples. The 274 pages outline subjects on assignments and operations pertaining to all members involved in a protection detail. View the "Table of Contents"for a breakdown on each chapter and view the "Conclusion" that examines each chapter written.
Inspiration……………………...…………...………………….…………..……..….…….........................................i
Forward……………...…………...……………………..…………………..….…...……...........................................iii
I: Bodyguard Introduction…………………...……..………………………………..…....................................1
Harmful Categories. - Assassinations. - Kidnappings. - Physical Harm. -Embarrassment. - Branches- Responsibilities. - Threat Assessment. - Information Gathering. - Zone Barriers. - Security Survey.
Communication. - Verbally Spoken. - Verbally Coded. - Color Coded Signs - Coded Call Signs -
Gesture Signs. - Individual Responsibilities. - Performance.
II: Standard Conduct……………………….………………………………………….........................................15
Behavior. - What’s Acceptable Behavior. - What’s Not Acceptable Behavior. - Mental Mindset. - Appearance. - Performance Attire. - Stand-By Attire.
III: Job Skill Outline…….……………………………………….......................…………………….....................29
General Investigation Skills. - Background Investigations - Undercover Investigations - Crime Scene Investigations - Computer Forensic Investigations - Advance Electronics - Information Broker - AIC Capabilities / Responsibilities. - Percentage Skills Breakdown. - Skill Breakdown Format -Drivers Capabilities / Responsibilities. - Members Capabilities / Responsibilities.
IV: Equipment……………………...………………………………………..…………...........................................45
General Equipment. - Additional Equipment. - Individual Branch Equipment. - Central Command Branch Equipment. - Principle Detail Branch Equipment. - Advance Branch Equipment.
V: Introduction to Terrorism……………………...…………………..………...........................................61
Sociology Definitions. - Sociology Basics. - War Games. - Arab Children Receiving Military
Training.- The Mind Has No Firewall. - Terrorism. - Terrorism Definitions - History of Terrorism. -Current Day Terrorism. - Elements of Terrorism. - Method of Statements. - Activist / Sleepers. -Characteristics of a Terrorist. - Concept of Religion. - Assessing. – Procedures of a Terrorist. -Portraying a Terrorist. - Operations of Terrorism. - Possible Motives. Social Status. - Political Status. - Jealousy / Vengeance. - Intelligence Centers.
VI: Gathering Personal Information…………………………......…..….............................................89
Client’s Information. - Open Statement To Client. - Client’s Breakdown Sheet. - Client’s Data
Sheets. - Additional Questions for the client. - Spouse’s Information. - Spouse’s Breakdown Sheet - Spouse’s Data Sheets. - Children’s Information. - Children’s Breakdown Sheet. - Child’s
Data Sheets. - Chauffeur’s Information. - Chauffeur’s Breakdown Sheet. - Things to Remember. Chauffeur’s Data Sheets. - Additional Information. - Secretary / Servant Information. - Secretary / Servant Breakdown Sheet - Secretary / Servant Data Sheets. Secretary / Servant Additional Information. – Fitness Instructor’s Information. - Fitness Instructor’s Breakdown Sheet. - Fitness Instructor’s Data Sheets.
VII: On-Line Information………….....…………………..………………….…...........................................133
Categories for Information. - Public Records. - Information Brokers. - Intelligence / Research.
Search Engines. - Public Record Locations. - Information Brokering Locations. - Intelligence
Research Locations. - Search engine Locations.
VIII: Zone Security…………………………..………………………………….……..........................................143
Zone One Barrier. - Zone Two Barriers. - Zone Three Barriers. - Client’s Zone One. - Zone One Breach - Action Recapture in Zone One. - Client’s Zone Two. - Action Recapture in Zone Two. -
Property Zones One and Two. - Action Recapture Within Property Zones. - Zone Three. -
Zone Clearance.
IX: Central Command Branch…………………………………………....…………...................................153
Base Station - Station Stand-by Mode. - Vehicle. - Weather. - Traffic. - Zone Security. - Updating Intelligence - Central Command AIC Responsibilities. - Central Command Member. - Safe Haven Protocol. - Note.
X: Principle Detail………………………………………………………….……..…..........................................163
Principle Detail AIC Responsibilities. - Driver Responsibilities. - Principle Detail Members. - Vehicle. Sabotage - Vehicle Disabling Locations. - Explosive Devices. - Listening Devices. Tracking Devices.
XI: Advance Branch……………………….…………………………………….……........................................171
Obtaining Vehicles. - Securing Locations. - Routes and Activities. - Hazard Locations. -
Emergency Locations. - Hosting location. - Tagging. - Advance AIC Responsibilities. - Driver’s
Responsibilities. - Driver’s Security Sweep. - Advance Members. - Advance Members Activity.
XII: Safe House…………………...……………………....……………………….…...........................................185
Favorable Circumstances. - Unfavorable Circumstances. - Area Within A Location. - Distance of Travel and Time. - Example. - Secondary Safe-Haven Location. - Coding. - Safe House Locations. - Documenting Safe House Area. - Safe House Hazard and Sabotage. - Hazard / Sabotage Locations. - Note.
XIII: Vehicle Inspection………………………………………………...…………........................................199
Vehicle Inspection Order. - Engine and Underbody Locations. - Mid Section Underbody Locations. - Rear Section Vehicle Locations. - Trunk Compartment. - Vehicle Interior Inspection. - Interior Section One Inspection. - Interior Section Two Inspection. - Interior Section Three Inspection - Preparing the Vehicle. - Things to Check. - Indicators. - Vehicle Secondary Security Options.
XIV: Third Party Contacts………………………………….….……………………......................................221
General Database. - Secured Database. - Limousine Company. - Stated Clause. - Stated Clause Reason. - Background Methods - Interviewing Method. - Employment History. - Previous Residence. - Personal Reference. - Third Party Responsibilities. - Prior to Mission. -
Private Air Charter.
XV: Suspicious Packages…………………………..………………………………….....................................237
Foretold Signs. - Equipment. - Designated Package Area. - Designated Package Area Preparation. - Chemical Area Preparation. - Explosion Area Preparation. - Common Packages. - Envelopes 4” x 9.5”. - Checking Method 4” x 9.5”. - Flaw and Barriers 4 x 9.5”. - Padded Envelopes 7” x 9.5”. - Inspecting 7” x 9.5”. - Plastic Barriers. - Plastic Barrier Method. - First Opening Method. 7” x 9.5” - Second Opening Method 7” x 9.5”. – Envelopes 9” x 12” or Larger. -
Plastic Barriers. - Envelope Flaws 9” x 12”. - First Opening Method 9” x 12”. -
Second Opening Method 9” x 12”. - Padded Envelopes 9” x 12”. - Cardboard Inserts. - Opening Method 9” x 12”. Priority / Next Day Envelopes. - Priority / Next Day Envelope Flaws. Opening Method Priority / Next Day Envelopes. - Box with Folding Flaps. - First Opening Method Box With Flaps. - Second Opening Method Box With Flaps. - Box with Removable Lids. -
Opening Method Box With Lids. - Suspicious Package Conclusion.
XVI: Conclusion……………………..…………….………………………..…………..........................................263
Index…………........…………………………………………….……………………..…...................…....................270
Bodyguard Introduction was written to expose an individual to the role of a bodyguard and responsibilities associated with that role. It emphasizes the need of education, skill development and experience. Within the chapter, harmful categories are outlined and explains the level of threat. Within this chapter, the reader will be exposed to verbal and gesture and color coded communications. Dedication and commitment are issues only an individual could determine.
Chapters II. III. IV.
Chapters “Standard Conduct, Job Skill Outline and Equipment” were addressed as necessary knowledge, skill requirements, mental condition exposes the different types of equipment utilized in this service. Within these chapters, an individual could prepare themselves in advance rather than being unprepared mentally or ability to provide.
Chapter V.
Chapter, “Introduction to Terrorism” allows an individual to understand different types of threats being projected by other individuals and/or groups. This chapter offers a basic understanding associated with sociology and not psychology. In order to evaluate an individual through a physiological sense, that individual would need to be interviewed personally in order to assess the mental state or type of reaction the individual projects, which leads to profiling the subject. The use of psychology on large numbers such as a group fails to properly assess the group as a single entity. The reason for this is because each member in the group has their own set of personalities, agendas and thought patterns. Outlining these subjects will be difficult to accomplish and increases time to access. The element of time is not available when it comes to protecting a client from individuals and/or groups that promote harm against the client or who has established a confirmed threat against the client and their family.
Sociology however offers a basic understanding on agendas and abilities associated with a group's social structure. Unfortunately, an individual providing service in protection will not have the ability or time to attend years of education on the subjects of sociology or psychology and from this reason, a basic understanding to the subject was expressed.
Methods on how terrorist organizations retain intelligence and how they apply planned actions are explored. Article included shows terrorism development from childhood. All articles show locations for retrieving and viewing further. Elements, characteristics, procedures and operations are explored with methods and possible abilities. Finally, intelligence research centers were written to expand the knowledge of individuals who are performing assignments.
Chapter VI.
The chapter, “Gathering Personal Information” deals directly with the client and those in close proximity of the client. This chapter offers an understanding on why personal information is required and expresses concerns relating to the client and their family. An individual providing a service in protection should retain any and all personal information on their client before attempting to provide a service that has increasing danger. Within this chapter, data sheets are outlined with solid reasons and follow a single format that will insure retaining proper information in a formatted setting. This will allow a security provider to outline proper security measures and secondary options while minimizing any possible oversight on any type of critical information. Formats also cover spouse, children, chauffeur, secretary, servants and a fitness instructor.
Chapter VII.
The “On-Line Information” chapter was written to expose areas of retaining information and intelligence including areas of increasing knowledge. Since the role of a bodyguard is to protect a client from either established threats or possible threats, a bodyguard should have a direction on retaining intelligence against individuals and/or groups that could pose a threat against the client. Information and intelligence is only a fraction to the equation. To finalize the need, an individual should have the ability to research within the security and intelligence fields to increase their understanding on new protocols and methods pertaining to current threats.
Chapter VIII.
The chapter “Zone Security” was written exposing methods of providing security barriers around the client and property. These methods incorporated situational threats exposing the need and reasons why zone security is an important issue to address. Zoning is also broken down to individual assignment and responsibilities.
Chapters IX. X. XI.
"Central Command, Principle Detail and Advance Branch" chapters were written to outline their function and individual responsibilities. These chapters exposed separate requirements relating to performance and included key areas of assignments pertaining to all members of the detail.
Chapter XII.
The "Safe House" chapter was written to expose reasons why they are needed and how to incorporate the use of emergency facilities in a security plan. From this chapter, the individual could understand key subjects relating to the type of conditions along with preparing the need. Locations on hazards and sabotage is expressed with caution. Methods of retaining a location were expressed with concepts like, "Favorable / Unfavorable Circumstances," "Area within a location" and "Distance of travel and time."
Chapter XIII.
"Vehicle Inspection" was written to expose the possible threats of hazards and sabotage. Since the client is in danger from possible unknown individuals, the risk of harm increases while the client is away from their safe haven. Locations within a vehicle were broken down along with the inspection order. All outline areas of possible concerns was expressed with reasons including secondary security options.
Chapter XIV.
The chapter, “Third Party Contact” outlines the need to develop and incorporate databases of secured and unsecured contacts. While this profession offers the greatest measure of supplying security, the need to incorporate others will become a possibility. This includes accommodating the client’s request in providing transportation and lodging. This chapter offers direction on retaining intelligence on third parties and expands to personnel employment background and interviewing methods.
Chapter XV.
Finally, the chapter “Suspicious Packages” was written to expose the danger of common packages such as envelopes and boxes being received either in a business setting or personal sense. Methods on examining the possible foretold signs on a package including the contents within was outlined. The need to isolate any package was expressed as designating package areas and explains how to incorporate and develop this area. Anyone attempting to inspect a package that may be suspicious should have increased knowledge on evaluating the level of threat associated with the package and should never attempt to expose the contents without having proper training and experience. Chemical agents and electronic components was exposed and shown as a means of delivering hazard and/or death.
Written in plain, no-nonsense terms, Bodyguard Principles is a "must-have",
Reviewer:
Midwest Book Review (Oregon, WI USA)
Written by professional security operations expert Frank Sciacca Jr., Bodyguard Principles is a straightforward, methodical manual on what it takes to be a bodyguard. Filled cover to cover with information on methods, concepts, and theories directly applicable to a profession with no room for error, Bodyguard Principles covers expectations for standard conduct, what skills are needed and expected (including investigative as well as protective skills), how to conduct a proper vehicle inspection, internet and online concerns, dealing with suspicious packages, and much more. Bodyguard Principles presupposes the reader has training in physical self-defense with or without weapons, and focuses upon the broader principles and methodologies of providing security rather than in-depth coverage of any martial arts. Written in plain, no-nonsense terms, Bodyguard Principles is a "must-have" for anyone seriously considering a career as a professional bodyguard or security provider.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reviewer:
Det. Sgt. Brian L. Royster is a detective with the Organized Crime Bureau of the New Jersey State Police. He is a graduate of the FBI National Academy and the FBI/LEEDA (Law Enforcement Executive Development Association) Command Institute for Law Enforcement Executives, and a member of ASIS International.
https://sm.asisonline.org/Pages/bodyguard-principles-protection-and-operational-planning.aspx
In the world of personal protection, the main objective is the preservation of the client’s life and well-being. Anyone looking for a comprehensive guide to this evolving career path need look no further than this book. A thorough and well-developed work, Bodyguard Principles should appeal to a variety of readers.
It’s not okay to just call yourself a bodyguard and put out a shingle. In many circles, in fact, using the term “bodyguard” connotes a lack of professionalism. Gone are the days when size mattered; cognitive skills now trump sheer brawn. It’s the knowledge and experience that count, and this book delivers on the knowledge front.
Author Frank Sciacca, Jr., an experienced protection professional and instructor, organizes the text into well-written and exceptionally documented chapters. In systematic fashion, readers navigate the inner workings of the profession. Outlining the many facets of personal protection, the author provides specific information on performing job-related tasks, communicating effectively, and planning strategically.
Bodyguard Principles stresses how security and investigation are synergistic. Each chapter emphasizes the rationale behind, and the importance of, training. Sciacca supports his points with lessons learned via personal experiences, which forcefully drive his messages home. Most impressive are the minutiae Sciacca has mastered and manages to convey to the reader.
It should be noted that the book’s publisher, Infinity Publishing, touts itself as a “self publishing system.” In other words, the book is self-published. Nonetheless, it is professionally presented, and the content is a far cry from the typical self-serving pabulum churned out by vanity presses.
Not everything here is new—many of the principles have been well discussed in earlier books—but Sciacca offers a fresh take, building on basic tenets with his advanced teachings. As such, this book is a valuable tool for all levels of protection professionals.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reviewer -
G. F. Bryant Jr., CMAS, CHS-V
Executive Director
World Institute for Security Enhancement
In an industry saturated with amateurs, wannabes and self serving, egocentric pretenders, it is indeed refreshing when through the piles of "bullshit" ( or "@$%&#?" for the politically correct ) a bright beacon of empirical knowledge emerges. Such is the case of the recently published "Bodyguard Principles", by a life long practitioner, Frank Sciacca Jr.
Mr. Sciacca has compiled in a comprehensive straight forward, matter of fact, manner the quintessential guide targeting the layman, professional and client alike. He has obviously been there, done it and lost the t-shirt. Twice ... I’d cover his "six" any day.
Bodyguard Principles will be easily identifiable by the "dog eared" appearance of it’s well worn pages. It is a must have for any personal protection professional.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reviewer -
Jerry MacCauley PPS,CST
Assistant Director of Training
Sexton Executive Security, Inc.
If you are new to the field of Executive Protection/bodyguard, you will find a wealth of knowledge in this manual. For those who believe that being a large, strong, well armed martial artist will automatically qualify you for the position of professional bodyguard, you may find that the incredible amount of preparation necessary to be successful may discourage you. However, if you follow the advice given by this experienced practitioner, you will be better prepared to protect your client. You will also find that by using some of these tactics, you will most likely avoid many problems rather than have to respond to them. The difference between a professional and an amateur will be found in these pages. You will not be able to read this manual straight through, but you will find yourself using this as a reference tool for years to come. Frank speaks from experience, not theory or fantasy.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reviewer -
John Siems, Corporate Consultant
“I’ve known Frank Sciacca for many years and had the pleasure of assisting him many times with security and investigations assignments throughout the world. There are no words to express who he is or the type of professional he represent. What I could say is, I never met a person with so much dedication and knowledge and I would follow this man to the end of the earth. If anyone knows Frank, I guarantee they would feel and say the same thing. Congratulations on your book. It’s about time you written it.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reviewer -
Rebecca LaBrie, Account Executive , Tracers Information Specialists, Inc.
I have had the pleasure of dealing with Frank for a little over a year now. He is a extremely friendly person that is very easy to deal with and has a vast knowledge of the industries in which he works. He provides services to our community that are considered invaluable by the customers he works with. He holds ethics and customer confidentiality to the highest standards. If I ever was in the need for security service, I know without a doubt where I would turn.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Brandy Jennings, NY
I purchased your book out of curiosity based on the information I read about on-line and in Security Management. I seen books come and go with every author trying to express their way is the only way. To be honest, I figured the cost of purchasing the book would be the same if I paid for a night at the movies.
After reading your book, I found myself realizing you didn’t brag about who you protected or make certain claims. From what I read and learned from the book is why I contacted you and asked you to sign my copy. Thank you very much and thank you for making me more aware of things. It makes my job easier. I recommended the book to everyone I know in the field of security in general
Copyright © 2022 Bodyguard Principles - All Rights Reserved.
Powered by GoDaddy