U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Protecting the Traveling Executive (From Clandestine Tactics and Technology - A Technical and Background Intelligence Data Service, Volume 5 See NCJ-77151)

NCJ Number
76469
Author(s)
J F Viggiano
Date Published
1979
Length
18 pages
Annotation
Procedures for protecting potential terrorist victims from attack while traveling in foreign countries are detailed, and methods for determining whether the protected persons are likely to become targets are summarized.
Abstract
Because terroristic organizations are becoming increasingly sophisticated in their attacks, the traditional bodyguard or blanket approach can no longer be relied upon; bodyguards can always be overcome by superior physical force. Development of a total security system staffed by professionals and detailed preplanning are required to safeguard potential victims today. International travel represents a major exposure area for Americans. Protection for potential targets is based on the use of an advance security agent who travels to the visit site several days before the actual visit occurs. This agent arranges security at the airport, during transportation, at lodging sites, and other visit sites; develops cooperative arrangements with American onsite representatives and foreign security forces; and collects both security information and information on local customs. The agent completes a report and briefs the principals receiving security coverage and the executives' staff. A security critique should be held following the visit. The level of risk assigned to a visit can be determined by the principals' affiliation with organizations opposed by terrorists, whether or not the visit is occurring on a significant date, and whether or not the country being visited is vulnerable to terroristic activities. An advance security checklist and 11 footnotes are included.