Protective Operations Front Cover

Protective Operations

  • Length: 224 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2011-03-22
  • ISBN-10: 1439851719
  • ISBN-13: 9781439851715
  • Sales Rank: #2652128 (See Top 100 Books)
Description

Protective Operations: A Handbook for Security and Law Enforcement is designed as a reference for law enforcement and security organizations tasked with protecting the welfare of an individual or groups of individuals. To be effective and professional, protective operations require the incorporation of a variety of skill sets. However, many departments and jurisdictions have only limited resources and training available. Filling this void, the book identifies issues particular to local law enforcement — and the private security teams that may be called in later — and offers suggestions and guidance for confronting high-threat scenarios as well as the more mundane protective details.

Highlights:

  • Details the essence of local law enforcement protective operations that are run, in large part, covertly
  • Examines threat assessment from both hostile organizations and unknown adversaries
  • Provides a solid understanding of operational security, situational awareness, and surveillance detection
  • Includes examples from real-world attacks occurring over the past sixty years
  • Reinforces the need for training in specific tactics and techniques
  • Emphasizes training for confronting the adversary
  • Focuses on the economics of providing the most protection for the least cost
  • Addresses issues surrounding possible direct violations of the law and department policy and procedures

The author’s decades of training, research, and experience provide invaluable tested and proven protocols for keeping subjects safe in a hostile environment.

Table of Contents

Chapter 1. Breaking the Mindset
Chapter 2. Policy and Procedure Considerations
Chapter 3. Weapons, Vehicles, and Equipment
Chapter 4. Training for the Adversary
Chapter 5. Assessing the Risk and Threat of Hostile Organizations
Chapter 6. The Protective Advance
Chapter 7. Operational Security (OPSEC)
Chapter 8. Overt versus Covert Details
Chapter 9. Surveillance Detection
Chapter 10. Levels of Protection and the Cessation of Protection
Chapter 11. Conclusion

To access the link, solve the captcha.