Skip to main content

Lesson # 5: Terrorist and Criminal Operations

Description

Material for a 3-hour lesson, part of the Close Protection Training Course, developed by the Kosovo Police Service School

Summary

For a close protection team to operate effectively, it must know the enemy. Worldwide studies of attacks by varied law enforcement “threat analysis divisions” have revealed the same common threads throughout. Although the enemy has a definite advantage, they do have weaknesses that can be exploited. If a close protection team is aware of these weaknesses, it can use them to its advantage and possibly prevent an attack or, at least, be more prepared to react in the event that it does occur. In order to prevent an attack, the detail must begin with understanding how an operation is implemented.

The goal of this lesson is to provide the students with an understanding of how terrorist and criminal groups operate and the most effective means of preventing an organized attack.

At the conclusion of this lesson, the student will be able to:

  1. Identify/describe the five phases of a terrorist or criminal operation to include: 1) Target Selection, 2) Target Intelligence, 3) Operational Planning, 4) Attack, and 5) Escape/Exploit.
  2. Identify/discuss the specific elements that directly apply to the five phases of a terrorist or criminal operation to include: Surveillance, Tactical Advantage Points, Rehearsals or Dry Runs, and Target Identification.
  3. Identify the two most effective options available to prevent an attack to include: varying the dignitary's routes and varying the dignitary's times of departure and arrival.
  4. Define "choke point" and "ideal attack site," and demonstrate the procedure in locating these sites through classroom practical exercises using a road map. Explain the significance of these two locations in preventing an attack.
  5. Apply the lessons learned by identifying the phases, elements, choke points and ideal attack sites to actual incidents (practical exercise).